0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:40:59 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x2, 0x5, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:40:59 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x481, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:40:59 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="04000000000000b22291bcf744ac4e1a62c446fa7f9639fa750ed5caa1de2fb8550f83f1aa7904216a8a26e45f6d6025e92dc2bffeaced8cf144b2d71b7e27fe53ad11daa0b9dac90911163a08b12dbc639faeb7a8e7777f06460fb14d173cf95aadc4"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:00 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="04a488052a99229161cb2fb2a7cdde2dab380000000000000000000000b0d2b2c6f5a9d7ade613892eccd2c7bfdbb130a2dbae7af1"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x22, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r4, r5, 0x0) read(r5, &(0x7f0000001a00)=""/4096, 0x1000) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:00 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="04000000000000fff300c2e3de2dab38000000000000000049000000006c08d3c97a7af35529cdf9aedf2115708bfc0a49a66f48957003560327d3db0dd5f70eede44721e5"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) syncfs(r4) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:00 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38816f90aef9123ff98aecfcacad149adfeb72b0b540ade9e7c6b64a6e1f2feda1c6a3873286a5a8731bbe871b7d425ad2374f76089f5878f78f1a3c88bcc3148f7eb60fca64b48e3d04eb0d832ea9c5e07999ae49a9f35f7df0094dc9d55ad4520325d4db7c0251ff13d048b8c7bfc5530b958c941939ad162c40df2ae283de192a54ccd5b8a042475d6f5a993cadcce062c476e0009389692ee990ae55e4bcd1c3f02a8e46"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000003c0)={0x3, 'bridge_slave_0\x00', 0x4}, 0x18) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:00 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:00 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r2, r3, 0x0) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f0000000080)={0x34}) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r4) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:00 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:00 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) sendmmsg$inet6(r4, &(0x7f00000003c0), 0x0, 0x40004801) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:00 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0), 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="040000008796ffc2ca3acc4f2cf2f8"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000780)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f0000000800)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x38, 0xc, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="01976bb9d08d1efd5ad32cdfc358f1133e6e36555cc7fa30ea469b45c30339122f37361e4d005c13d9ed546c0884ea3c92d4dc7cc7be031fe1c1ee0b4a9243ae0bebc632a3b8f8d9fd316af4e905c65f1affeeca29d0ff4a9586e53d3a4dbeaabe98fda86658030ce0a72ead16c9665aeb187e584ba01f7d2a934b95de5bb5ea", 0x80, r3) r4 = request_key(&(0x7f0000000580)='trusted\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)='bpf\x00', 0xfffffffffffffffd) r5 = request_key(&(0x7f00000006c0)='user\x00', &(0x7f0000000700)={'syz', 0x1}, &(0x7f0000000740)='security.evm\x00', 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r3, r4, r5, 0x1) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x18045) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:00 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04720000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:00 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="040000000000df0000000032916ca42fb2a7cdde2db6ab000000000000"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0xfffffffffffffffe, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc, 0x1, 0x1}) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r4, r5, 0x0) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f0000000580)={{0x2, 0x4e20, @local}, {0x859a32bc2b4679a5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10, {0x2, 0x4e20, @rand_addr=0x80000000}, 'veth0_to_hsr\x00'}) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:01 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f0000000580)="20268a927f1f6588b967481241ba7860f46ef66f4a9092a339a4c3a07ddb525a0700de938d09a175d89748bcf12ec5f1e0b02bd67aa03059bcecc7a95c25a3a07e758046ab4e81700aae55d80fecf9221a7511bf00000000000000000070c63d2564c10a2828ee8c7c9a0158e8768a78678155a988bfd6a393582501f6c8a51c9dbe3a1b05053dbae0545343f63a119cdc49a4d74e88a213f4ffd53a9ad98aa99299defe29fa47f06d71424716f5cc4fcbeaab106b322fde4f5727e20000", 0xbe, 0x44004, 0x0, 0xfffffffffffffe51) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:01 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:01 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r0, r1, 0x0) openat$cgroup_int(r1, &(0x7f00000003c0)='notify_on_release\x00', 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r2, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="0400000000fec998d400c2e37911393916a42fb2a7cd"], 0xd, 0x4) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r4 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r3, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r5, r6, 0x0) fallocate(r6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmmsg(r7, &(0x7f0000008600)=[{{0x0, 0xe0, &(0x7f0000003140)}}, {{&(0x7f0000000100)=@un=@abs={0x1}, 0xa, &(0x7f0000007380), 0x54, &(0x7f0000000600)}}], 0x4000003, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:41:01 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:01 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x24200, 0x24) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000020}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x5c, r4, 0x330, 0x70bd2c, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x3f}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xff}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x80}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:01 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000030000005287655aa7cdde1efc680000000000004000000000"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xffffffffffffff0b}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) unshare(0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:01 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) r3 = dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) ioctl$VT_ACTIVATE(r3, 0x5606, 0x7) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:01 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:02 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb23f000000ab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:02 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:02 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:02 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9903006ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000003c0)=@gcm_128={{0x304}, "bff846abf44fc753", "35c074ceb0ef68762186f7b2dd3ba98b", "06c8d071", "fb495916c22231c2"}, 0x28) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) socket(0x2, 0x3, 0x31) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:02 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) ioctl$VT_ACTIVATE(r4, 0x5606, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:02 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xdaa, 0x0) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:02 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:02 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:02 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0xff, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab3813625a69531e4c241338da6785dc02e7b36fce58a76bb0f1f0d7a1c1a8203fbd79574734253d249efd77861251e049c66ccf6ae1c6ce5be8bcae47af772812ac7ed5b6b9db90dd7a1d4170ce88dcc4685987565d49626c67b5e451fcacc1cfca41ba455b8fb63e4f2050b5b98a358bf3bd314153ce8046e6abb4d6a7c4e9f0da2f3ab2cda16a5c99b43fd9320e5089ccb9d03131570d9d"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f00000003c0)=@req={0x4, 0x5, 0x1, 0x4}, 0x10) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:02 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r4, r5, 0x0) ioctl$EVIOCGKEYCODE(r5, 0x80084504, &(0x7f00000006c0)=""/238) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:03 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:03 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:03 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:03 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r2, r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r4, r5, 0x0) accept4$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14, 0x1800) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) sendmsg$nl_xfrm(r3, &(0x7f00000014c0)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@polexpire={0x132c, 0x1b, 0x300, 0x70bd2a, 0x25dfdbfd, {{{@in6=@local, @in6=@rand_addr="cd807556937cd1ea0ea9262d73f91d31", 0x4e22, 0x0, 0x4e23, 0x2, 0x2, 0x80, 0x90, 0x88, r6, r8}, {0xfffffffffffffffc, 0x7, 0x2a, 0x6, 0x7, 0x29d, 0xc04, 0x9}, {0xcda, 0x80, 0x400, 0x80}, 0x1, 0x0, 0xf75251d91b9b0740, 0x0, 0x4}, 0x2}, [@tfcpad={0x8, 0x16, 0x3}, @lastused={0xc, 0xf, 0x7fff}, @ipv4_hthresh={0x8, 0x3, {0x10, 0xe1}}, @sec_ctx={0x100c, 0x8, {0x1008, 0x8, 0x3, 0x80, 0x1000, "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"}}, @tmpl={0x244, 0x5, [{{@in=@rand_addr=0x2040, 0x4d3, 0xff}, 0x2, @in=@empty, 0x0, 0x0, 0x3, 0x6, 0xfffffff9, 0x1f, 0x7}, {{@in=@multicast1, 0x4d6, 0x2b}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x34ff, 0x0, 0x2, 0x1f, 0x1, 0x5, 0x4}, {{@in=@loopback, 0x4d4, 0x6c}, 0x2, @in=@multicast2, 0x3506, 0x2, 0x1, 0x0, 0x101, 0x3, 0x5}, {{@in=@loopback, 0x4d4, 0x33}, 0xa, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3502, 0x3, 0x0, 0x8a, 0x8, 0x3ff, 0x5}, {{@in6=@mcast1, 0x4d2, 0x32}, 0x2, @in6=@loopback, 0x3504, 0x2, 0x0, 0x5, 0x1, 0xffffff01, 0xffff}, {{@in6=@rand_addr="7f75ff3b1e28d4b7f51c0a7c98a92552", 0x4d6, 0x3c}, 0x2, @in6=@dev={0xfe, 0x80, [], 0x14}, 0x34ff, 0x1, 0x1, 0x6, 0x80000001, 0xffffd616, 0x9}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4d2, 0x3c}, 0x0, @in6=@loopback, 0x34ff, 0x4, 0x3, 0x0, 0x2, 0x9, 0x81}, {{@in=@loopback, 0x4d6, 0x2b}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x24}, 0x0, 0x2, 0x2, 0x2, 0x8, 0x80000000, 0x2}, {{@in=@broadcast, 0x4d4, 0x2b}, 0xa, @in=@remote, 0x0, 0x2, 0x1, 0x1f, 0xfffff800, 0x0, 0x4}]}]}, 0x132c}, 0x1, 0x0, 0x0, 0x800}, 0x80) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r9, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r9) r10 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r10, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:03 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) fcntl$addseals(r2, 0x409, 0x1) 00:41:03 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f00000006c0)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:03 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x0, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:03 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab3881cb6c0fa9ba40e0b9e95b33e350c12dd35c7a2e"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) llistxattr(&(0x7f00000003c0)='./file1\x00', &(0x7f0000001a00)=""/4096, 0x1000) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:03 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="045fc7c3689eb9770e00c2e3b873052ab932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:03 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:04 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:04 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r4, r5, 0x0) write$cgroup_int(r5, &(0x7f0000000080)=0x4, 0x12) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000000)=0x1, 0x4) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200, 0x0) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x3b) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r7, 0x0, 0x0) fcntl$setown(r6, 0x8, r7) 00:41:04 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x0, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:04 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) prctl$PR_SET_KEEPCAPS(0x8, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:04 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38e87d98e83fcbfdf4c7cc1c43a8d68468219d4729877e0cc52ad3ab983b461590ba0b649122773c4b8ff7d62d12f23c1c3c9f66473380deeed170321699f5f3b97d8982e2c7fb6ec4528e58c78182609dd0697940db8006f4cd3e25ae9f04cdee40bfc046e0bcc52f7543a9c515cd0ec57f629be2cc890d75d7c4502eb0a8"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = open$dir(&(0x7f00000003c0)='./file0\x00', 0x200002, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xffffffffffffff04, 0x10001, 0xfffffffffffffffb, 0xfffffffffffffffc}) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f00000007c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1440404}, 0xc, &(0x7f0000000780)={&(0x7f00000006c0)={0xa8, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xbe}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffff00000000}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xf92}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x40}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffe1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x80}, 0x0) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:04 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000580), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca4c55f123f9f21148d1f758f4df0aa2fb2a7"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x101, 0xfd17) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10402, 0x8) sendmsg$nl_netfilter(r4, &(0x7f0000000600)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000005c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x124}, 0x1, 0x0, 0x0, 0x8000}, 0xa0949c9064044a35) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48015}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:04 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x0, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:04 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r5, r6, 0x0) connect(r5, &(0x7f0000000640)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @empty}}, 0x80) dup3(r3, r4, 0x0) socketpair(0xa, 0x6, 0x7, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000005c0)={&(0x7f0000000340)={0x1c, r8, 0x8, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20000084) sendmsg$TIPC_CMD_SET_LINK_TOL(r7, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x101008}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, r8, 0x200, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x1, @link='syz0\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x40c06) sendmsg$TIPC_CMD_SHOW_PORTS(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r8, 0x2, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20001000}, 0x200a8052) r9 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000140)='threaded\x00', 0x5dc291) r10 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4048000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x3c, r10, 0x0, 0x0, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x12, 0x2}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0xa8d3c3e0ddc93ba1}, 0x100) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x96fb6f923cf1eee2}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)={0x104, r10, 0xd, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x70, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gretap0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x34}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="cefba37ce9708a009946ab3d82205b44"}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xfc}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1c2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xe79}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x44801}, 0x5) 00:41:05 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:05 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:05 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r0, r1, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000003c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)=0x0) perf_event_open(0x0, r3, 0x0, r2, 0x0) r4 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r4, &(0x7f0000000000)='security.evm\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="04000000006d00fff300c2e3b873052a9932916ca42fb2a7cdde2dab381073663efdf37b2ba986a95be1e817049b031116d82b3ebc7c95a8e49da6d785e4234d02ea"], 0xd, 0x4) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r5, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e24, @local}, 0x10) r6 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r6, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0xf}, {&(0x7f00000003c0), 0x163}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e79998d5e75d4e6387ef3d5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d74a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0x5}, {&(0x7f0000000140)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x1b}], 0x4, 0x0) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r5, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:05 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="040000000000006f81f0fb703a635a8e3a8bbd7afff300c2e3b87305a560ebd31688a5cfce8d716ae0938ba72138ab106aafd22e7bc77c8299a828ac2d2fd9c1c8497d9fd94b83afd2605dd64f1547974ce346c0b3f5ca6e022c5c7e5e66278ec4ccf1ad26be9f304ff67d94ab046af8f2821d78fd5eec5eb9dde83908cefc552ba23cb5065a20bc75981b766c91225ada9e1886177b90b021c991383d8977b2fed5bb7ae69bdd01e0802f0300000042b18c481fd3"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f00000003c0)={'ip6gre0\x00', {0x2, 0x4e24, @rand_addr=0x80}}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8000) socketpair(0x9, 0x1, 0x20, &(0x7f0000000580)={0xffffffffffffffff}) sendmsg$TIPC_NL_BEARER_SET(r5, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:05 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:05 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r0, r1, 0x0) r2 = fcntl$getown(r1, 0x9) ptrace$pokeuser(0x6, r2, 0x80000001, 0xfff) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r3, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r5 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r5, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r4, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) r6 = dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNGETIFF(r6, 0x800454d2, &(0x7f00000003c0)) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:05 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x40100) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r1, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x8) r3 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r3, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0xbc80, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r5 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r5, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r4, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/checkreqprot\x00', 0x20000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f00000003c0)) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:05 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x40000) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:05 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="040003386e0000000000916ca42fb2a7cdde2dab380000c9636af6b694e94feda4d9e9a894c720686dd7e00000000000"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000600)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x14, r4, 0x1, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4044095}, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) 00:41:05 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:05 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:06 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38e9cbf49b2424a07619d160862b7cc0"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0xffff, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0xd5adf2e215c7e673, 0xfffffffffffffffe, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:06 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x10, 0x2, 0xe) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab3863865e7cca251224413d00e79afc4d70290f497a280f5f3082a9ac9f604d4a6c7f535e8823fe2d250049f8f3d7db347a3657663a3c6be0c699c4dbebde9d07567e9d41327f4ca7f6330a2168e6a442904a00fdb75d1be565adb8bcaee7e8451ad19d5e288fe280ece1f20ff7a598d24065e3aea2f6c2a7f6eb7656ed31e09b1fe9"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000740)={0x1, 0x2, 0x1000, 0x8e, &(0x7f0000000580)="eb8cfd5f60b0dd6de76bffd0bdc1e9f13e04ad1fc880e80c3a5ca2a8a88fa88f60d335bf6865fc763dab487892a3bf6a037a9fb814c986422399bbedcbbe6aff6ed60c50b1cf2eadd1989787c4616b91f7d99161c65fefe24361943dff72ef00c67ce24c0d1fcdea35b41ea50e9318775f0c0d16bea19d15dc9e7aeacf5b0b08c41a90f2ef80e6129377f8911b75", 0x77, 0x0, &(0x7f00000006c0)="fdb072b3c29e94ee2d3d2383cbc21fbf5887e0602334514ea93f505b1ba1a38f95aa465cfa4a52c8cfe7bb7fb07ddafda50d9a1ede5d835a99011202807374a109e96293d8f69ac6826abb0360f9c71e1a1e72018c020cd890c632236b1c4779deb9983cee9f58f45297f08d43fa7b7780feea5b9115de"}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a0000070000000000210000008541"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a0000000000000400000000000000000000002100000000000100000000000002000100010000000000000000fd00000500050600000012000000b8d2c6e61d5372bbb6896209000055781309e339be593f7710aa000001"], 0x70}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x10) sendmmsg(r4, &(0x7f0000000180), 0x3ef, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 00:41:06 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="09d6165bfbd27dbd13e519bf02769d0000000000000000"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) accept4$unix(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000003c0)=0x6e, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000600)=[{0x1f, 0x8, 0x4, 0x1}]}, 0x10) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x9) 00:41:06 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r0, r1, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x3, @perf_config_ext}, r2, 0xffffffffffffffff, r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) dup2(0xffffffffffffffff, r3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r5, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r6, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r7, r8, 0x0) write$selinux_context(r8, &(0x7f00000003c0)='system_u:object_r:anacron_exec_t:s0\x00', 0x24) pwritev(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x54}, {&(0x7f0000000580), 0xd2}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r6, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000080)={0x67446698, 0x0, 0x4, 0x0, 0x4, "893e7f49554a265ac4e46f8dd9d09c02f3fae2a42f81fe06d402c53ca5de2520b51dfbe468506289b4515edf19b2327ef8b64cc28f19431dace33292174da225336da4840519b729135608780e913804a0aca9"}, 0x63) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:06 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="0400000100000087cbcc5aa4cf5e22"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:06 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r2, r3, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x175, &(0x7f0000f40ff8)}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r5 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r5, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r4, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:06 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:06 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x20000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000400)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_bp={&(0x7f0000000340), 0x1}, 0x40, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xb) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r2, &(0x7f0000000000)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040000000000e45843a030ae2a40d6a90500000000000000000000cfbe3b92a0139c176eb57c000000000000000080b96f6234448829c334ba2614000000000001000000"], 0xd, 0x4) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) r4 = socket$inet(0x2, 0x803, 0xa0) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x6e) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r5, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$sock_timeval(r4, 0x1, 0x2, &(0x7f0000000040)={0x0, 0x7530}, 0x10) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r7 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r7, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r3, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x89, 0x0, 0x0) 00:41:06 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:07 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="04130000000000fff300c2df88730e2aea70736ca42fb20004de2dab38bbcff6647140b0053c97e0e10729d07cd7fe5c170df8534d19b48c6ca9d13759d64a7df110cb8c263d94b7a0344162a039196e0b5cbf1d338cbfce7feca00522630ce66c17def7e90d6184548eeed11a0ff8b381d62284accd11be1cc7a5ce63b957fb25d9ddf34fb8c1cef8daf1d66c8b5dd4fbe61d2103000000ffb0a3099e13a866133634ed793aa3ed3ea3708ec44def83a750684c1fa3c7b0df2079f8ffb7f6b73bfc21608f93bd19379f9c30cbaea934635a3d75f84a77448a713722fb16c30a8a500fe68ea0ceef1ee77efbd7cdb28a2a1ada93a1efa922"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540), 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x5, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000003c0)={0x2, 0x70, 0x80, 0x7, 0xc1, 0x80, 0x0, 0x7, 0x14, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcee6, 0x4, @perf_bp={&(0x7f0000000240), 0x8}, 0x40, 0x5, 0x3ff, 0x6, 0x839c, 0xffff}) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req3={0x1f, 0x8c, 0xffffffc1, 0x9, 0x6e2, 0x6, 0x3}, 0x1c) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r4) io_setup(0x4, &(0x7f0000000500)=0x0) io_submit(r5, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r4, 0x0, 0x12f}]) io_getevents(r5, 0x7, 0x1, &(0x7f0000000280)=[{}], &(0x7f0000000440)) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:07 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x2, 0x5, 0x4) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r1 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:07 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0), 0x26021, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x48000, 0x0) 00:41:07 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x2, 0x5, 0x4) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r1 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:07 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:07 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f00000005c0)='blacklist\x00', &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="01976bb9d08d1efd5ad32cdfc358f1133e6e36555cc7fa30ea469b45c30339122f37361e4d005c13d9ed546c0884ea3c92d4dc7cc7be031fe1c1ee0b4a9243ae0bebc632a3b8f8d9fd316af4e905c65f1affeeca29d0ff4a9586e53d3a4dbeaabe98fda86658030ce0a72ead16c9665aeb187e584ba01f7d2a934b95de5bb5ea", 0x80, r1) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000580)={'syz', 0x3}, &(0x7f00000005c0), 0x0, r1) keyctl$get_security(0x11, r2, &(0x7f0000000600)=""/55, 0x37) r3 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r3, &(0x7f0000000000)='security.evm\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="01800000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab90a8ea31c1c371ca4497c64c5035eac23ba89dfba437fc198a141725c656b4743c387199521200"/80], 0xd, 0x4) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r5 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r5, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r4, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:07 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x2, 0x5, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r1, r2, 0x0) fsetxattr$security_evm(r2, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000eef3000900b8731b2a9932916ca40000a7edde2dab38"], 0x1, 0x4) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0xffffffffffffff91) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r4 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r3, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:07 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3b) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) ptrace$setopts(0x4200, r4, 0x0, 0x0) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x2, 0x4, 0x1) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:07 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) ioctl$BLKREPORTZONE(r4, 0xc0101282, &(0x7f0000000180)=ANY=[@ANYBLOB="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"/444]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000140)='threaded\x00', 0x5dc291) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, &(0x7f00000000c0)) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000080)=@ng={0x4, 0x1, "6275895894"}, 0x7, 0x1) 00:41:07 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x2, 0x5, 0x4) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r1 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:07 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:08 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:08 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000580)='./file0\x00') socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x2, 0x5, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r1, r2, 0x0) fsetxattr$security_evm(r2, &(0x7f0000000000)='security.evm\x00', &(0x7f00000007c0)=ANY=[], 0x0, 0x4) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x64dc62290e2a9b03) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r3, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0xd28830a4c8e61309, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x8}) dup(0xffffffffffffffff) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r5, r6, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000005c0), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:08 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000dd0000fff300c2e3b873052a9932916c002fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) sendmsg$TIPC_NL_PUBL_GET(r4, &(0x7f00000005c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000580)={&(0x7f00000006c0)={0x404, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1b93}]}, @TIPC_NLA_BEARER={0xc8, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x43396246}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @empty}}, {0x14, 0x2, @in={0x2, 0x4e21, @local}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @empty}}, {0x14, 0x2, @in={0x2, 0x4e24, @remote}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast1}}}}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7ff}]}, @TIPC_NLA_NET={0x68, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xe22d}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fffffff}, @TIPC_NLA_NET_ID={0x8}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}]}, @TIPC_NLA_BEARER={0xd8, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'veth0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @local}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x6, @mcast1, 0x4}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffff7}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7fffffff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8a}}}}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xec, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2125519b}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x61a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x68, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbeb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}]}, 0x404}, 0x1, 0x0, 0x0, 0x42048}, 0x0) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:08 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:08 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:08 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000000)={{0x2, 0x0, @identifier="bd950ab6633ac4e785f9ea10c664c8d6"}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) ioctl$TCSETX(r4, 0x5433, &(0x7f0000000640)={0x89b2, 0x1, [0x8, 0x8, 0x727, 0x8001, 0x40], 0x3b9}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000500)={0x0, 0x0}) syz_open_procfs(r5, &(0x7f0000000600)='net/udp6\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r9, r10, 0x80000) writev(r9, &(0x7f0000000580)=[{&(0x7f0000000180)="4c7e72e1979fbb0faf251f700cd565b7d3e7978c1fea60d8b7df26ff34c667ebbeb36ac0e4838d53e222a9e8388a7a1091a78963da19c150bc382a40b6015fa2407a488c3372c715eedca9aa602c67242f17a0b069fd9a7a02b6880cbe5abaa27ea604b96f31475720e063a08e94168417eac9880c601b3c826a3c6cf5e012cb51b3d6ab01df20b3bda9f1abccfeb987f245b6a8eec0f2687cc85762b13f12f8c661ea", 0xa3}, {&(0x7f00000000c0)="1fceaff923d62d79f872167ae21dc600d8dea1c4b33afdf220d4a100c2016d438cd8e44d321f1330adbe80f8f43ca3b53aee3e47ddcffccd34844bf9c7415e7c2bde6caa7553ab303fdd0449f8bd061741f33c59d2add5243bf122f80da8", 0x5e}, {&(0x7f00000002c0)="5beb96fed1f862660d8b574354c89caf40bdeae3bfd2ffa98783608490857381eab098065a83bf2a05a1734516feafbcd64ee913ef4d3ca68d4961c7a6e6e5bce9f2694608da6d0cdea7c4728b3ba460a9a6cba8abcb4f65df35e150cb1f750190c9282d86401ba84c50da08c985830755d829388a530987858b67a77c6d06d9c31dba1fb56e960b5458e30c81145bb823d591cfde3cca6e7a74531cd200af174941e30fd0ca3c876a53ecd83f5af636c6ff55922f2de9cada02e00e90ed6c", 0xbf}, {&(0x7f0000000380)="5cd441c689bc83bb1cd3d6e34b94ee51d4eec13b80d82d3bc84f282fe18f6c52983e64fdb0b153e08b5213aff0e5637c96b4a5bdaa0b75a019a91694dcb12ae3401f6a85caafe57e6e0d1cfc306e75c5368b14bb666397017883282757b2247b15a844ef6fe0f744472bcb4252d5163ab265541a19e1400604e4c3d78a7faa2efbefca2e6d12246bc25c30792c0d219d31c7097eef10", 0x96}, {&(0x7f0000000240)="a5092af7b410cec53bb481300739c6cc6d6fb67f4db870f027", 0x19}, {&(0x7f0000000440)="076700bb9aec4d12d6e97781127114ce19192c15ca81962f5696fc48fad6b7cd384ccfa17040f3dc71a7007e3c300ba3ef9d91140485cf9a2a1a00c9efcd2b84df061058a54771a24e57a763f620c3436de2c5cb691bf108a93071d3c8c922d8550e3792c7d4b503ff51984380babff508cb73f2713de9214a0b34aafbf0a30fa978b4ca0b0d72cfbf955d9f6de11eb51c22ef82376f176cba52ee967b1d5ca59f51e5406f7b5f88", 0xa8}], 0x6) dup3(r7, r8, 0x0) ioctl$BLKRRPART(r8, 0x125f, 0x0) write$cgroup_type(r6, &(0x7f0000000140)='threaded\x00', 0x5dc291) timer_create(0x2, 0x0, &(0x7f0000000540)=0x0) timer_settime(r11, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x77359400}}, 0x0) timer_gettime(r11, &(0x7f0000000080)) 00:41:08 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:08 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, 'memory'}, {0x2b, 'pids'}, {0x2b, 'pids'}, {0x2b, 'rdma'}]}, 0x1a) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000140)='threaded\x00', 0x5dc291) clock_gettime(0x0, &(0x7f0000002b40)={0x0, 0x0}) recvmmsg(r3, &(0x7f00000029c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000180)=""/142, 0x8e}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000280)=""/113, 0x71}, {&(0x7f0000000300)=""/153, 0x99}, {&(0x7f00000003c0)=""/209, 0xd1}, {&(0x7f00000004c0)=""/4, 0x4}, {&(0x7f0000000500)=""/201, 0xc9}, {&(0x7f0000000600)=""/59, 0x3b}, {&(0x7f0000000640)=""/156, 0x9c}], 0x9, &(0x7f00000007c0)=""/89, 0x59}, 0x3a}, {{&(0x7f0000000840)=@caif=@dbg, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000900)=""/85, 0x55}, 0x1}, {{&(0x7f0000000980)=@nl, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000a00)=""/134, 0x86}, {&(0x7f0000000ac0)=""/196, 0xc4}, {&(0x7f0000000bc0)=""/103, 0x67}], 0x3, &(0x7f0000000c80)=""/86, 0x56}, 0x7}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000d00)=""/2, 0x2}, {&(0x7f0000000d40)=""/111, 0x6f}, {&(0x7f0000000dc0)=""/72, 0x48}], 0x3, &(0x7f0000000e80)=""/201, 0xc9}, 0xffff0001}, {{&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001300)=[{&(0x7f0000001000)=""/80, 0x50}, {&(0x7f0000001080)=""/120, 0x78}, {&(0x7f0000001100)=""/238, 0xee}, {&(0x7f0000001200)=""/239, 0xef}], 0x4, &(0x7f0000001340)=""/173, 0xad}, 0xa8e6}, {{&(0x7f0000001400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000002840)=[{&(0x7f0000001480)=""/49, 0x31}, {&(0x7f00000014c0)}, {&(0x7f0000001500)=""/25, 0x19}, {&(0x7f0000001540)=""/137, 0x89}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/100, 0x64}, {&(0x7f0000002680)=""/162, 0xa2}, {&(0x7f0000002740)=""/238, 0xee}], 0x8, &(0x7f00000028c0)=""/194, 0xc2}, 0x1}], 0x6, 0x10000, &(0x7f0000002b80)={r5, r6+10000000}) preadv(r7, &(0x7f0000003180)=[{&(0x7f0000002bc0)=""/18, 0x12}, {&(0x7f0000002c00)=""/238, 0xee}, {&(0x7f0000002d00)=""/246, 0xf6}, {&(0x7f0000002e00)=""/32, 0x20}, {&(0x7f0000002e40)=""/136, 0x88}, {&(0x7f0000002f00)=""/218, 0xda}, {&(0x7f0000003000)=""/134, 0x86}, {&(0x7f00000030c0)=""/78, 0x4e}, {&(0x7f0000003140)=""/61, 0x3d}], 0x9, 0x0) 00:41:08 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c29bb873052a9932912df58cb7ea63b37314bf"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:08 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x200, 0x0) write$P9_RFLUSH(r0, &(0x7f00000006c0)={0x7, 0x6d, 0x1}, 0x7) mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) getrandom(&(0x7f0000000580)=""/140, 0x8c, 0x0) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:09 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r2, r3, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0x7a) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r6, r7, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r7, 0x10e, 0x8, &(0x7f0000000340)=0x5, 0x4) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r8, r5, 0x0) write$P9_RGETATTR(r1, &(0x7f0000000280)={0xa0, 0x19, 0x1, {0xc670842831e8944f, {0x0, 0x1, 0x4}, 0xc, r4, r5, 0x7ff, 0x1, 0x2b0, 0x8, 0xffff, 0x1, 0x3ff, 0x1, 0x5, 0x2, 0x84, 0x8, 0x7f, 0xf93a, 0x26b}}, 0xa0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/user\x00', 0x2, 0x0) dup3(r9, r10, 0x0) setsockopt$inet6_tcp_int(r10, 0x6, 0xe, &(0x7f0000000380)=0x4, 0x4) r11 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r12 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r12, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r11, 0x2405, r12) r13 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r13, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:09 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:09 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000100fff300c2e3b873052a9932a56ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r5, r6, 0x0) sendto$inet(r6, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x4c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x4, 0x0, 0x80000001) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:09 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r0, r1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000003c0)={'veth0_to_hsr\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r2, &(0x7f0000000000)='security.evm\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xd, 0x4) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r4 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r3, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:09 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:09 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x2, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:09 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000e7fffffef300c2e3dc85a8"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000003c0)) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x102) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r4, r5, 0x0) r6 = dup3(0xffffffffffffffff, r5, 0x80000) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@empty}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000cc0)}, {0x0}, {&(0x7f0000001cc0)="3205ea1f7c33525c7313543f13dd186bd31563af78a79983dcd175259927d64ad8422a1b934eb9ba1bc0a63e4fa58cf5a660aed585dbd2b12c75b8e1636cdd8d866b7134d2723a43d05f300f84b021f43ae65051ad0de93b81ce110b36e857f2913da1d209364d2656ea89a5031cf763567dc4e35d758fd779becbfc1f9b2d30876a0a0f07c1a96a804cafc40cfd7d45f8386c25b2bb14f3118b048a183f5ba95a96c5739ad5dc727b9f05c974e48be14ddde6cd0fab26704bbc1902cb73193dd2", 0xc1}], 0x3, &(0x7f0000002300)=ANY=[@ANYBLOB="5000000001000000000000000700000083110291b5f3a2a44166ec6546f0e8e336018629000029c80502000e8959f55c209be906931770ff041726fa0709408b7f72c7674406069e3c36590101000000110aed000001000000000000001c000000000000000000000008000000223bc65737e384887e40f493b6262b478828bebf42df5fdfadcddc97c43ed21083449594ae7e1858be0c2ede4f5e0aa6e5768e81c2eb1ad5fece1320d6b65b60", @ANYRES32, @ANYBLOB="ac1414217f000001000000001100000000000000", @ANYRES32=r7, @ANYBLOB, @ANYRES32, @ANYBLOB="e0000001ac1e000100"], 0xd6}, 0x40045) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r9) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@empty, 0x4e22, 0x3ff, 0x4e22, 0x8000, 0xa, 0x80, 0x0, 0x29, r7, r9}, {0x3ff, 0x80, 0x10001, 0x2, 0x7, 0x1, 0x4, 0x8}, {0x0, 0x3f, 0x8, 0x8}, 0x3, 0x6e6bb6, 0x0, 0x1, 0x1}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d2, 0x33}, 0xa, @in6=@dev={0xfe, 0x80, [], 0xc}, 0x3503, 0x3, 0x1, 0x3, 0x80000001, 0x400, 0x7}}, 0xe8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:09 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f00000000c0)=0x2) dup3(r4, r5, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001ec0)={{{@in6=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@empty}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000cc0)}, {0x0}, {&(0x7f0000001cc0)="3205ea1f7c33525c7313543f13dd186bd31563af78a79983dcd175259927d64ad8422a1b934eb9ba1bc0a63e4fa58cf5a660aed585dbd2b12c75b8e1636cdd8d866b7134d2723a43d05f300f84b021f43ae65051ad0de93b81ce110b36e857f2913da1d209364d2656ea89a5031cf763567dc4e35d758fd779becbfc1f9b2d30876a0a0f07c1a96a804cafc40cfd7d45f8386c25b2bb14f3118b048a183f5ba95a96c5739ad5dc727b9f05c974e48be14ddde6cd0fab26704bbc1902cb73193dd2", 0xc1}], 0x3, &(0x7f0000002300)=ANY=[@ANYBLOB="5000000001000000000000000700000083110291b5f3a2a44166ec6546f0e8e336018629000029c80502000e8959f55c209be906931770ff041726fa0709408b7f72c7674406069e3c36590101000000110aed000001000000000000001c000000000000000000000008000000223bc65737e384887e40f493b6262b478828bebf42df5fdfadcddc97c43ed21083449594ae7e1858be0c2ede4f5e0aa6e5768e81c2eb1ad5fece1320d6b65b60", @ANYRES32, @ANYBLOB="ac1414217f000001000000082500000000000001", @ANYRES32=r6, @ANYBLOB, @ANYRES32, @ANYBLOB="e0000001ac1e000100"], 0xd6}, 0x40045) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000000)={@empty, 0x65, r6}) iopl(0x1) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:10 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:10 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0xd6, 0x0, 0x9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) write$binfmt_elf64(r4, &(0x7f00000006c0)={{0x7f, 0x45, 0x4c, 0x46, 0xf9, 0x4, 0x7, 0x3, 0x8001, 0x2, 0x3e, 0xb4, 0x2f2, 0x40, 0x30d, 0xff, 0x400, 0x38, 0x2, 0x1, 0x3, 0xfbff}, [{0x4, 0xb55d, 0x5, 0x7, 0x5ca, 0x3, 0xf41}, {0xd, 0x800, 0x80, 0x0, 0x3, 0x40, 0x3ff, 0x7f}], "aff77a9ed67c8d27c2bcc5e307824f395a39b4c1608a2fd38c2afa42deefed2c3160495475440805227c00969c4647b2a232799fc0ded6fd6c77df6f4a614c3b4212c1b6a67d73614d820bc7176ea64a4a01803014384b16e8ed6150ad8cdb846a39f389029e427827cd4a354f2ca0f60b46533da93bf53505e3cb1e764deec1dbaee3", [[], [], [], [], []]}, 0x633) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:10 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:10 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007f9, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) listen(r4, 0x1) r5 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r5, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x40000) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:10 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 00:41:10 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000003c0)={0x0, 0x6}) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:10 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000006, 0x40010, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:10 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:11 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000580)) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916cefd4a9fff3792c3038"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f00000003c0)=""/32) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:11 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', 0x0, 0x0, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:11 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r2, r3, 0x0) fcntl$setsig(r2, 0xa, 0x7) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r4) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:11 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab389b06f02524aa7ba90e1dd60403bf13f07c8b77113259158fd9846cedf092b3e2bdbccc821d9fcf0d917e13bfb09f86800a82980e21b9dac3ab561eb788104aef566d8d26a6b95584cbd36f1b64adf4c05c1d9bab046419c2de62e4e30dbd2eedec9092b9447626610d4929992fc3fc9ebc5e16aa8240353bcb51cfac6f1ffac9e9d164986f18f409fb7ef85422ca490e250ebacbd021401d9c61"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) r3 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) futimesat(r3, &(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)={{r4, r5/1000+30000}, {0x0, 0x2710}}) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r6 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r6, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:11 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x548af5d61ce1a1be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r0, r1, 0x0) r2 = dup(r0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r3, &(0x7f0000000000)='security.evm\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="201af9d742459ceafe504d4a29f099a112fd75e2602022dfe2e25851bcc1c385c19123f7b7dd000044b6b6a1d6aadd23e32a8b93efab07cf7a1647ee1ce87dd6762d0c1f9457b237fc00492bc3f035aecb364f1fe613798894eade35214337abef302665c585941262ba19223e27b6b5148ef7c976e143355c21403a6dd80d8599870eb51d051b8ae4e0798dfe123e485511d8b2ee0432ce3ec1007facc402343ff75d558fb2bd955638da43c1872ddca53d2eb139df8c3c908365556ef4fb409ebc8e63d95551d65bc38b1ae5754f1b057d255662e1989202d4ce6221e4b0e56dc614b0093f6c6e44be95032e"], 0x1, 0x4) unshare(0x24020400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r4, r5, 0x3ff, 0x0) r6 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r6, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r7 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r7, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r6, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) 00:41:11 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="04000000010000ff8000c2e3b873052a9932916ca42fb2a7cd0300000000000000e1"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x20000000000003e0, &(0x7f0000f40ff8)}, 0x329) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) sendto$inet(r4, 0x0, 0x73, 0x20000779, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x9a}}, 0xffffffffffffff09) r5 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r5, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x57, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x4}) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:11 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:11 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="f300dcc2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:11 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab386b6bc1331f5260fbac28a90fa8fa8adec99660bd3e2b0db606f4697e25c86f8a1fdc91121a48d1f0c7c7bbadbfc4ad5a5e220819db33989de9873e5af02de52ba99b71c71f4eb443e753a891882675d32a964c897ff8fcc44da4866d6d3888b60c0ccd48af827d6beeb6996bac348941e0ccf2e5f98b4f00bd3978fba94ad7811bf13e6fc1ae99bb445aa15d53b3feb972b8f01c8b0303ed8319ae3a7b9ab6f86c09c314c826d12bfb8a830b34731819820c"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x4, 0xfffffffffffffffc) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:12 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', 0x0, 0x0, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:12 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:12 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[], 0x0, 0x79abaf4badcd1312) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6}]}, 0x10) r3 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f00000006c0), 0x0, 0xffffffffffffffff) keyctl$get_security(0x11, r3, &(0x7f0000000700)=""/75, 0x4b) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r4 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000003c0)=0x0) ptrace$poke(0x4, r5, &(0x7f0000000580), 0xe7f0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:12 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x210000, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) r4 = dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) ioctl$PPPIOCGUNIT(r4, 0x80047456, &(0x7f00000002c0)) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:12 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xffffffffffff8000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:12 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:12 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', 0x0, 0x0, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:12 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x32b7e8940d432ca1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4048000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x3c, r3, 0x0, 0x0, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x12, 0x2}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0xa8d3c3e0ddc93ba1}, 0x100) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000600)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x38, r3, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x14}}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000008}, 0x4000) r4 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r5 = epoll_create1(0x0) r6 = epoll_create1(0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f0000000780)) epoll_ctl$EPOLL_CTL_MOD(r6, 0x3, r5, &(0x7f0000000180)) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x1f}) dup(0xffffffffffffffff) 00:41:12 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:13 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="0400000031000000fff300c22dab"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) r3 = socket$key(0xf, 0x3, 0x2) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f0000000580)={0x0, 0xfb, 0x63, 0xa, 0x0, "57303399ee442aba61e246d3ab312c47", "455e8ce7433ef5ac528794a98e5de4d3a7208d76e63367d812d1ec3cd4e5ce675bddb65257e2adde1c41f2d1d5b50b1f1d7a907aadff12c8c65807d7209e6160d9098d91bfa396f363cab1404ba1"}, 0x63, 0x3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r4, r5, 0x0) sendmsg$TIPC_NL_PUBL_GET(r5, &(0x7f0000000380)={0x0, 0xffffffffffffff7c, 0x0, 0x1, 0x0, 0x0, 0x20}, 0xe0c34b2d6dd71768) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r0, r1, 0x0) getpeername(r1, &(0x7f00000006c0)=@caif=@dbg, &(0x7f0000000600)=0x80) mount$bpf(0x0, 0x0, &(0x7f00000019c0), 0x0, 0x0) mount(&(0x7f00000002c0)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000580)='hfsplus\x00', 0x80, &(0x7f00000005c0)='bpf\x00') mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x11, 0x2, 0x8) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r3, &(0x7f0000000000)='seauri\x87y.nvO\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="0401000000effffeef00c2e3b873052a9932d97f7e677e376842139af9"], 0x1, 0x4) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r5 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r5, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r4, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r2, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:13 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x7f, 0x0, 0x0, 0x0, 0x6, 0x440, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = getpgid(r2) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r4) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000140)='threaded\x00', 0x5dc291) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) ioctl$sock_SIOCSPGRP(r5, 0x8902, &(0x7f00000001c0)=r2) tkill(r6, 0x3b) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r6, 0x0, 0x0) ptrace$peekuser(0x3, r6, 0x3ff) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r7, r8, 0x0) getsockopt$IP6T_SO_GET_INFO(r7, 0x29, 0x40, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x54) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001300)='/proc/self/net/pfkey\x00', 0x747002, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r9, 0x4018620d, &(0x7f0000000080)={0x73622a85, 0xb}) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r10, r11, 0x0) ioctl$TIOCSSERIAL(r11, 0x541f, &(0x7f0000000200)={0x5, 0x2, 0x9, 0x2, 0x2, 0x0, 0x8, 0x1, 0xeda, 0x40, 0x8, 0x873, 0x2, 0x5, &(0x7f00000002c0)=""/4096, 0x192, 0xfffffffd, 0x4}) 00:41:13 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x5) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r3) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/dev\x00') ioctl$BLKROSET(r4, 0x125d, &(0x7f00000000c0)=0x4) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r6, r7, 0x0) ioctl$TIOCMGET(r7, 0x5415, &(0x7f0000000100)) write$cgroup_type(r5, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:13 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r0, r1, 0x0) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000580)=0x18e) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000003c0)='/selinux/context\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r3, &(0x7f0000000000)='security.evm\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xd, 0x4) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r5 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r5, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r4, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:13 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[], 0x0, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:13 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="02060008000000fff300c2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:13 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:13 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[], 0x0, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:13 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xc, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f00000003c0)=ANY=[@ANYRES32=0x0], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:14 executing program 0: mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x4041, 0x0) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:14 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) flistxattr(r1, &(0x7f0000000080)=""/44, 0x2c) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2, 0x2) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:14 executing program 2: mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:14 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[], 0x0, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:14 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x200000, 0x0) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0xf) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:14 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0), 0x10e}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0xfffffffffffffd02}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:14 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r3, 0x7, 0x10}, 0xc) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000011, 0x10, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r4, r5, 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r0) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:14 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x8) syncfs(r2) ioprio_set$pid(0x1, 0x0, 0x800004000) r5 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x2000006100) ftruncate(r5, 0x2081ff) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) 00:41:14 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x4, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:15 executing program 2: mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:15 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:15 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:15 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) r4 = add_key$user(&(0x7f0000000040)='\xf0\xff\xff\xff\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000240)="237d59d5c9e1874770939fb8fa55c85d5b5ec6bded8b5e7ac26b3d18c2e5bba756c277b47592be68ea563409bf0c375830106a8db48b640a036d73ee4e6655f498a47652f77d4fc69252e1e56ff411616ebd434f68c9d7fbfce98aa5d4", 0x5d, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) r5 = add_key$user(&(0x7f0000000040)='\xf0\xff\xff\xff\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000240)="237d59d5c9e1874770939fb8fa55c85d5b5ec6bded8b5e7ac26b3d18c2e5bba756c277b47592be68ea563409bf0c375830106a8db48b640a036d73ee4e6655f498a47652f77d4fc69252e1e56ff411616ebd434f68c9d7fbfce98aa5d4", 0x5d, 0xfffffffffffffffc) keyctl$revoke(0x3, r5) r6 = add_key$user(&(0x7f0000000040)='\xf0\xff\xff\xff\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000240)="237d59d5c9e1874770939fb8fa55c85d5b5ec6bded8b5e7ac26b3d18c2e5bba756c277b47592be68ea563409bf0c375830106a8db48b640a036d73ee4e6655f498a47652f77d4fc69252e1e56ff411616ebd434f68c9d7fbfce98aa5d4", 0x5d, 0xfffffffffffffffc) keyctl$revoke(0x3, r6) keyctl$dh_compute(0x17, &(0x7f00000002c0)={r4, r5, r6}, &(0x7f00000006c0)=""/214, 0xd6, &(0x7f00000007c0)={&(0x7f00000003c0)={'sha384\x00'}, &(0x7f0000000580)="88e50b3237d50209fa3296a6e75e255558447446f77b711de41885d730fbf61f7f14a43f409a425cf5738504a2a87786545f8449988da1d3e4772a8b35ee037a9eb0e57923e43edcca0486a2e0bef437423cb711c06a4c1e1c0e7fbe526a8cbc0be8174dfd677a4557400d3cd01823cf9bcbf91e7b3bdaad27e27f7941e050124f7b2e91e3aeca91886265a3b09f31ecb10d57d5f0b480718c7c6b026a24e1acbdb3bccb38ae0e63dbee144cbe2a210de16c9a82f8c055f15cbe", 0xba}) 00:41:15 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f00000006c0)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) ioctl$KDGETLED(r4, 0x4b31, &(0x7f00000003c0)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0xb4216, 0x0) 00:41:15 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40, 0x0) ioctl$EVIOCGABS20(r4, 0x80184560, &(0x7f0000000180)=""/238) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:15 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x6, 0xff) perf_event_open(&(0x7f0000000a40)={0x5, 0x70, 0x5, 0x3f, 0x0, 0xd1, 0x0, 0xff, 0x10000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xc83, 0x0, @perf_bp={&(0x7f00000002c0), 0x1}, 0x620, 0x1, 0x3, 0x7, 0x1, 0xff, 0x8}, 0xffffffffffffffff, 0x4, r0, 0x2) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000ac0)=0x4, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) set_robust_list(&(0x7f00000006c0)={&(0x7f0000000580)={&(0x7f00000003c0)}, 0x5, &(0x7f0000000600)={&(0x7f00000005c0)}}, 0x18) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) syz_mount_image$f2fs(&(0x7f0000000700)='f2fs\x00', &(0x7f0000000740)='./file0\x00', 0x9, 0x5, &(0x7f00000009c0)=[{&(0x7f0000000780)="e6c9522aa79ea5bba47cd807c69d8bfdb9ebf325ee9d7a9bee42a704b6188d0668b50ef18133693f3da30c0eb0e295878dcdce0eeb5d86367c", 0x39, 0x8}, {&(0x7f00000007c0)="57959a2447fd423340f44a3c57f3d19c1d38176a286a4847bb6ebbc577e4cf6aaab701edfc90c270b0766d80e22c5ee2377f8310e401cd2e6e9f37a880390fb482e41cfd2d3a52be6df8", 0x4a, 0xe8}, {&(0x7f0000000840)="17002cb021aeabdb0706f12c47dad153fcfe957306cfffd03c80c4dbc21602b6c8ea33ca9177ec7b836e6fb6b85b5397108d0bb6153a3df535308b5cec768d91f6cc215e3b85a2482cad67a43c7fe68f45dbf4330de830124f31968e70dcaa2ff2f0923b5da3cdb110a6de89113d64d164987766600fef7c65c25bb1bcc6f037c6f8f26d9bfd301ca3ed05dcdaea0e5567567a8235268e6e7a49b35c8142af8d2201bae1fc8fe441aa135393aec588b59025e71bd4103befc5", 0xb9, 0x8}, {&(0x7f0000000900)="9ab6dfb7ee215aee188680c0eba7a0393ea18c34a198ff", 0x17, 0x3}, {&(0x7f0000000940)="9e8f220430456dd563812d9c915a0de3a2121db0f72d204208be38d8a8c7cd752c4a923eca248d588e2b69f2b85efec97a8660f8b1fa479ecdbceb581fe16f0165811b0edd713ad9daf59a90bc", 0x4d, 0x8001}], 0x1000000, &(0x7f0000000b80)=ANY=[@ANYBLOB="6a71666d743d76667376312c6163746976655f6c6f67733d342c6d6f64653d6c66732c6673796e635f6d6f64653d7374726963742c6261636b67726f756e645f67633d6f66662c7573726a71756f74613d2c2974727573f0ffc0836673796e635f6d6f64653d706f7369787f7686bf1351b4815f6d657267652c6e6f61636c2c0200796e635f6d6f64653d70cb8769782c7365636c6162656c2c7065726d69835f646972656374696f2c6673636f6e746578743d756e636f6e66696e65645f752c004c1bc7011ada33d45602a8df1508f4e5ea48e1beb753a51fc86cc88a735f527c848cfa405a3e9628df0ac3f0ce2dd00f44f9f2f7c1f409c4a762445e8384c1fd9d15be385b9a5b6afa62b4b6127e7a009ac628db1b2723e43f04580e7abbbe0d5c8f11556d6f8311e27132103218e7dbb1b0fd7a372daae50868ba78f6f2"]) 00:41:15 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="e74c25b8b678440004000000000000fff300c2e3b873050f9932916ca4"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x27f0b89a1a3bf51, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x8, 0x5}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r4, r5, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047459, &(0x7f00000002c0)=0x80040) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r6, r7, 0x0) r8 = dup3(r6, r5, 0xfcd8511ad71f85f9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r8, 0x2f646c42af642f29) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:15 executing program 2: mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:15 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r0, r1, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r1, &(0x7f00000006c0)="035d2d33d0528c697507e0ef8f05d2e87630b8e541056461d0a39c7f3caf256ed1ae46a9bae06b625d8b626108d7e45b8dae6f560957855c21db91d028ad0fd25bd91fb68d150eaf854b9dacd79627e69a85722bb507456e8fd3fb030cd162484425101d27a485914d18e6cfa36609d1d89bc9a33071496aaadd14727c29127550ee9ff9314d832d13d26a64ef11608e20d12a38df4d4a006ecee56854de10a64f9305ac068be0d6497f482f0a44322ef4b8ee025443bd1d8441b7329ea9d245a87323b64e60cb45e45813ae91fbed0c27567715", &(0x7f00000007c0)=""/239, 0xd800d64a2e094291}, 0x20) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x81, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r2, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="147b0000000000f5f300c20500f2ffffff0000f3a42fb2a7cdde2dab38cc4d47964c858c3dab63ae00c43b72e2179804e21950a1bfc1690726c4e341be7f86a99bb4714fce8137416f471da1c20990fa747647f66d50c0818505b982c07da27444633924566f6b3740c26665586480d612ed3d3f382138c07bd74f71587053b73ea6f418f0d1940ab8e5ee0fd3cc9a234396102cb844be23c3be6de4c89ff711f2e87d99806cac9abd093d9e6bc102cb8fc70007cc67b46bde"], 0xd, 0x4) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r4 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r3, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:15 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) r3 = creat(&(0x7f0000000340)='./bus\x00', 0x80) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r3, &(0x7f0000000680)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80001}, 0xc, &(0x7f0000000640)={&(0x7f0000000400)={0x228, r4, 0x314, 0x70bd29, 0x0, {}, [@TIPC_NLA_MEDIA={0x5c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x25ebef04}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xcd10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2c3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xf0}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xdbf8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffff}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA={0x7c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000000}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5096}]}, @TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1ce}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffb}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3ff}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x228}, 0x1, 0x0, 0x0, 0x801}, 0x20008cc4) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000580)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10002000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000840)={0x180, r4, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x0, 0x2, [@TIPC_NLA_PROP_PRIO={0x0, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x0, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x0, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0x81}]}, @TIPC_NLA_MEDIA_NAME={0x0, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x0, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x0, 0x2, [@TIPC_NLA_PROP_PRIO={0x0, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x0, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0x100}, @TIPC_NLA_PROP_MTU={0x0, 0x4, 0x18000000}]}, @TIPC_NLA_MEDIA_PROP={0x0, 0x2, [@TIPC_NLA_PROP_WIN]}, @TIPC_NLA_MEDIA_NAME={0x0, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x0, 0x1, 'eth\x00'}]}, @TIPC_NLA_NODE={0x38}, @TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd99a254}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}]}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_ADDR={0xffffffffffffffb7, 0x1, 0x1e18}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_REF={0x0, 0x2, 0xcfc}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_SOCK_REF={0xfd4e, 0x2, 0x9}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_PROP={0xffffffffffffff6b, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_TOL={0xfffffffffffffcdf, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x900000}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffb}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8c5}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffb}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x10}, 0x8643a36dfb9beb01) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r5 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r5, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffd, 0x4}) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:16 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:16 executing program 2: mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:16 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) lsetxattr$security_smack_transmute(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000580)='security.SMACK64TRANSMUTE\x00', &(0x7f00000005c0)='TRUE', 0x4, 0x7) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x4000000, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0xfd46) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket(0x9, 0x4, 0x8c) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000006c0)={'filter\x00', 0x89, "eab117b5f4adc82af975adbe1abe1ce502da2f4c47246ceb6ed109987d4aca436359d983fed68c297adc90d2e5f53aaf83070a2ef049723f6ccabb267899aa969ddce28753c10f02229f3541e88a69bdcfc5777c8687856b45ba2eefd033ee905b4b503c4741eaa3743a8e315a5f411e8936b9de542151383ef192d052addce2217c732dfc8465c1f2"}, &(0x7f0000000600)=0xad) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:16 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="04000000000000f22906fff300c2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:16 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80, 0x0) write$selinux_load(r3, &(0x7f0000000180)={0xf97cff8c, 0x8, 'SE Linux', "02ee717304142c3cfa90d33a8ca4f807d8eaf82ea0ff69017feaf2f2e1059df5ccb84361d87aaa2cb563669d4760a878be62ee1e186684ab464e4740b109c573b51e90963443232b67df3480f981d15bfc0142755248caaa4553b090df3ad46cd582e075e50754fccf5d245de71a56354a2fa2757d2c658d5b0b4e619265ab0d7d62725c08e784a08bf5baa42858f6481e321e8e987f271e13b439f4d9c258daa1195fd0f1560b4ec910e938656e5ad9c303346c10e86a08d82f7f"}, 0xcb) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:16 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:16 executing program 2: mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:16 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) r0 = syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x10000) symlinkat(&(0x7f00000003c0)='./file0\x00', r0, &(0x7f00000005c0)='./file0\x00') perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r4, r5, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r5, 0x0, 0x2a, &(0x7f00000006c0)={0x800, {{0x2, 0x4e22, @remote}}}, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:16 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x200c150, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r4, r5, 0x0) setsockopt$sock_int(r4, 0x1, 0x31, &(0x7f00000002c0)=0x2, 0x4) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:17 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:17 executing program 2: mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:17 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x400001, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r1, r2, 0x0) ioctl$TIOCSTI(r2, 0x5412, 0xd406) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r4 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r3, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:17 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:17 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:17 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916c35e5dc204874905ac9"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x74a69530324260f9, 0x3) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@empty, @in6=@ipv4={[], [], @dev}}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:17 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="040000000000db0bf300c2e33f9aff3b5b426fa5ee7a703ef0d2b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000580)={&(0x7f0000000800)={0xfc, 0x0, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0xbc, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3e41}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0xc, 0x1, 'et\x14h\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffff50}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x40000}, 0x1) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:17 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x1, 0x4, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) r4 = creat(&(0x7f0000000000)='./file0\x00', 0xaa19702244d0a33d) write$cgroup_type(r4, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:17 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x0, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:18 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, r4) 00:41:18 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x81, 0x40080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x7, 0x0, 0xfffffffffffffffd}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04e9000000d4c0a2a7618ad640836392496fc2e3000000000000000000"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88deba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f0000000580)="fadda26d2c7313bcf10893465eefad7e0acb3c973a61439cb143b23db961fb6e1477cda178447ec83098bc3e5b61ed66a446e31f1fb3151f6373a8031005fcd8ad01897476cc505bebb5c6ca1dbd9436ae8ed89dd84fbeb9d6bc55be7362f0f4a5cc0166417d7172c910bae5b55216ebc265e01616e6b3d019bc3b62c1", 0x7d}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000600)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) ioctl$TIOCGPTLCK(r4, 0x80045439, &(0x7f00000003c0)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:18 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x4, 0x9}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r4, r5, 0x0) ioctl$BLKPG(r5, 0x1269, &(0x7f0000000580)={0x1, 0x4c2, 0xde, &(0x7f00000006c0)="a7140828650af8234b8e9219bd70254ae05eee38730ac8bd33660885664196e15b0131169f828f23e4421e636cbb747b83803e7ed3415eba410a90ef66b19bf0dcbeb5741ec8b28db06c684554916df34d2a7f15f983da9ced12130248a9e341b52801a600f4fd5123938fd9a40ab0d10bb2990aa1948f1ca6f89bfc904720897b42052c0d094f5e9846d47c8feea290bb5b2ddecaa9abee2642cda035c54bf26659b3ac9e77b62e6d26751ab3c37e20a94e6a537b66cc282f69ee9391deecb8b3861904398dfe6609092b0d9a03255102f637ff07d5322aee6d9f4c3bd0"}) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:18 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r0, r1, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffffffffffffe, r1, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3b) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r4, r5, 0x0) r6 = dup(r5) ptrace$cont(0x7, r3, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffff53, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x1c201, 0x0, 0x2}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000000c0)="03e8689d", 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r7) accept4$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c, 0x40000) r8 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r9, r10, 0x0) ioctl$KIOCSOUND(r10, 0x4b2f, 0x3f) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r11, r12, 0x0) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) write$cgroup_type(r8, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:18 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab3880572198162677b1282c93cc3a5af43cc7fe52c0f855fa4e3bdd0984c30810ed0a1aa39184f67159216c3d435de56b70eb33df1b9435fff7daa03c"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:18 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:18 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x0, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:18 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47139135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) fallocate(r4, 0x3a, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:19 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42f"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:19 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04409b66a96035070fc1b8b6f25aa8"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_POLL(r3, &(0x7f0000000040)={0x18}, 0x18) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) socket$inet6_tcp(0xa, 0x1, 0x0) 00:41:19 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r2, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r4 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r3, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f00000006c0)=""/255) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:19 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RXATTRCREATE(r3, &(0x7f0000000000)={0x7, 0x21, 0x1}, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:19 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r2, r3, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0xffffffffffffffee) r4 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:19 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x23}}, {0x2, 0x4e21, @local}, {0x2, 0x4e21, @local}, 0xc8, 0x0, 0x0, 0x0, 0x72, &(0x7f0000000000)='lo\x00', 0x0, 0x1, 0x3f}) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:19 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x0, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:19 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0xfffffde9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x45}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:19 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fc6a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) write(r4, 0x0, 0xfffffffffffffea8) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:19 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42f"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:19 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:19 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="0400f0ffffffffffffffc2e3b80900b4b9e8ea2e4f25f4f450eaec8cf5150635aff345015e2080b7ad8c814b45000000000000000000"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:20 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="040000006da7ef27f300c2e3b873052a9932916ca42fb2a78dde2dabff"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r0, r1, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x1c}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x92, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff9}, 0x0, 0xffffffffffffffff, r3, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:20 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x288, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$assume_authority(0x10, r3) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_misc(r2, &(0x7f0000000180)={'syz1', "31e2fbff67d4b0c9fc7aca54021c67e4595b3fa0e4d160d8e2d4e764c2b9559dd46a2f9a101abada2e32c02b442e04619c3d6058989015e983a47c87cf716ecd2a97c9e9b10e"}, 0x4a) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r5, r6, 0x0) fsetxattr$trusted_overlay_opaque(r5, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x0) write$cgroup_type(r4, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:20 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x80000001, 0xa, &(0x7f0000000c80)=[{&(0x7f00000006c0)="a75d2d5156f9a4f094dad7f33052c0fb347ecdcfb25efbb62d6dc1fc06bea1609f4d1e2fc2f85138a3326e8c3abddf9cb98d0dc59efa04b0cc430a7133b9116dd074eb04e4995cc44be0ad4b67ea4ed1052e3a905ec8fc350edb7a9cae8bb5498ea584a1b7fe026cbc9da5a194d48b760b2cf285e70c1fc84a3b790d2df134ee6c37351044b36cdc823f1b52", 0x8c, 0xbd}, {&(0x7f0000000780)="1025123b30f1b2b70416ede98faa1dfd34c8673c06604d849b6902fb01fcfb5915aa9ad1d2d719a6c7ff384aa20df1e61cbdf8e354eb34fd7967f26f6a0716ac605a534de56879cc470d8431009abfc3e1c49d9bfdb6670bee866c38070d38d4d8647f2e8c3c703bfbbe4bac9b5a7b693043232778ba78f7fc7986cd0c3f490e13dfca10629defecd2ba27d012a77d3825c3c9aa3bd24bccf003df938c8629c9e87e00bbcc6d242299cad601519f5b118572b0cc22fa85ef4dfb42e38c4c9c37ac2044ad5a76d131b124e861648bb8617b385e", 0xd3, 0x5}, {&(0x7f0000001a00)="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", 0x1000, 0xfffffffffffffff8}, {&(0x7f0000000880)="ce6a72161c32a285d930ac189ff5f8f1568029656a2ef5332b519fc6c7e5d5b3efec1cecf286d95ad9d9ed2d7b603af71b6cdd021059fc8f9c95b90ecf491a4a3cd43572ff27548a35406d7401e3a7df4a4aa329ab8eeb0398154fbaebbd72fd68a50ea32eb5b8846a711c2b94f551d30f233b1252b0a9d9056cec9172a7", 0x7e, 0x8bf}, {&(0x7f0000000900)="e8435d236916f076eaf9f0d78d7398e8ab6a89ed12bda44770a0cd657fade2c7ae273ab2565d31287133343d5a65ade5b5fb5f6187a79239bf42a2d5e7811d824b633f050d1fea91423b20368bab58d33ad893cab6e03cb809b20a0f2d6fbfd9e2a75d642a0648202db3b38a6a09c91c095e880ae1d7461a82af916e92664cb9a07d4fe625819c292c84", 0x8a, 0x2}, {&(0x7f00000009c0)="4bed384b7d7673d0d6822e80facec5fb2db1067af8245a65e96ea2844fad323e1670ff168ff08906ccca6340b1432ef272a795e987fe02d09fa30fbe15346e3139ae3234ea34e2accaa85024cce35d25cf5649d59d8c82e550351353335074e0160c82f541720af9e4651ae8942be28a6d895961d6ed3ad9c24b20aef93136471c966cf535fd347777642094270f9cc169f353cc4f4671255109840eac7c6a42ec49f4b151ffa1a807419f7decd738c62b595ba1736ccc9c86ebebbdecdbab4d82e9fb51708688e573a533193a0b8bf6349806784f6481bd83690b4aec1e", 0xde, 0x7}, {&(0x7f0000000600)="1946299a66126f83f7a0273bc9f0b97465f44771a4d7c8b4762c1d7f7baec5458a48cbe397da575cec539e5c86f79060e6c90d417a8e2206a083", 0x3a, 0x1}, {&(0x7f0000002a00)="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", 0x1000, 0xf52}, {&(0x7f0000000ac0)="cdc98f438fec303fed8924ed1c68b35bf8ef451e77c045b4ad8c6aef8925d5375c0c69968d2343f6021713e65ffe50871260bf3a0c3108557cd0661d6d4164cbdb29ede7bc41fee7f2a4f0b973836f2dc5e682eb201e670be95f2b7c20b4fbe1a60a9c2d14ce8cb8c404120dd62b79c21a1b2f05a903adbdc7f08fad92df044cb372d3d4baef6a65905947c5fb88182bf413363937b915e7f409c10605095b6d5887e25c7ed802982a38aa6cb9d930bdc3c3b7aae5ddb80b59237a44f01712ef15c40197e495eb06ea3d77c9", 0xcc, 0x200}, {&(0x7f0000000bc0)="e39cb11271690db2b9476bc1cbe16bf827ec90179899104d301bf09e8d392df7855472a0a9ac864797c18e2e0a3dc001e22a0b0738d23a99a978463f616e7862b6606cd842117ab45dff82c3fe2d9f3587650c926a6002fc5af97bab0d6eab9698219629fd8136653b4344161531d2afed854338b62e3929555130c26d7788b2c0d04e476cee470bd79894cf84691ca46edb21d507f9f2966ce585ac7910b6bfd242ff174b0b83dba7d3ff4d5a38679140ff63e50b401e7d08", 0xb9, 0xfffffffffffff7c3}]) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000d80)=ANY=[@ANYBLOB="04000000004000fff30002e3b873052a9932916ca42fb2a7cdde2dab38eda7d5e232e3e4c1ae6515f9d3c18ca123a207fd96b9f88996ab579efa25d6d23762ad0d98aa89bc55211e6a078b9f20fa649c555bf774e54809005a8858366f4b9c348b6131de2544f164f3c8b4a20bfd7195cdd831d2af9e132884eccbefb429c08da71f50945c63c404bb85bf8ef56272860d0731e5d0"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$inet6(r3, &(0x7f0000000580)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000005c0)=0x1c) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:20 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42f"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:20 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:20 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000580)="88ff43756c3d5195e88da3a8327b581512c80832d3dac660c7ca6aa4fa7599ae2ea3dca3087af15c3351adb9970c6f43ebb19a34c4025f8e1e00"/80, 0x50}, {&(0x7f00000003c0)}, {&(0x7f00000006c0)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb4ad5fe2d36b1538da5960b9bf923c6c6df7831d1e402819d24406366639c381adaf78180e6757563122c3de977f3b309e", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) ustat(0x101, &(0x7f00000003c0)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x80) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:20 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x2e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x20109, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_bp={&(0x7f00000003c0), 0x2}, 0x8000}, 0x0, 0xf, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/443], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f00000006c0)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xfe17}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup3(r5, r6, 0x0) sendto$inet(r6, &(0x7f0000000580)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x4d, 0xc, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:21 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r5) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:21 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:21 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:21 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) io_setup(0x6, &(0x7f00000003c0)) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r0, r1, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="160004000000000900746672656164656400c3000000"], 0x16) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:21 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3b) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r5, r6, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x3f, 0x81, 0x1f, 0x3f, 0x0, 0x9, 0x10, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0xa, @perf_bp={&(0x7f0000000000), 0xe}, 0x2007, 0x3, 0x0, 0x7, 0xe0000, 0x9, 0x33}, r4, 0x0, r6, 0x2) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) 00:41:21 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:21 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:21 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:21 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0xfffffe83, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={0x0}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x908}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:21 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305c42a9932916ca42f6e2282d649fa10"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r4, r5, 0x0) setsockopt$inet_mreq(r5, 0x0, 0x23, &(0x7f00000002c0)={@initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:21 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="040000005a9400fff3a861e3b87205"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f00000006c0)="a7466266dd1c48fcb43c6c6df783e2a3f146c68f7f9a1e1d3e402819d25406366639c381adaf78180e6757563132aadea07f3b309e7c85ec054195f40c45d35f9b897644b53d45eae63e060000003fa6884efbf6913d060637f9bfa4757ce3b543db08a23caeca73cf3bac457ece5b4e8af89343c9416e2c296be97c6fe4d649c715b51cc3662484e5050b70af87ea1c9bd397996fff5f78ac581c1b9e288b50ce3de8282bc5e1a9d2cc1c4c933a87c61737c944ed870500e7af115ec51ce8a374c328735da17a2e3b438b1c1b89a85f2094fa30ab8177ddb4529937412381b5bd63a9a8f2ced22aa328c0cff702f7155b19a98ed2c03ed5a116ecf10dc48130a74f260739723d212dc81d18ae060d798d0beec54b6d40fa7e3966d80891b2ba0c413818423046f83d4f8aae6c41df078c51d85a5d100217c42ad96690c1b1212f772cf832668b9e0a17fd6b96a383151fdae5b2584d3a83b8870fe902f0416568a0e41b6627bd90ae215dd796edf2636619b7ab9356e0427bebee3428b8825123dfd26817f95ed8ce111f0e638765fc297a0764cfe7eb6aeb8c7459c0b3f378006048c66747f9e91cf1f351a9", 0x1ad}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/status\x00', 0x0, 0x0) ioctl$TCSETXW(r3, 0x5435, &(0x7f0000000500)={0xb599, 0xfffc, [0x1, 0x400, 0x1, 0x2, 0x8], 0x7}) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:22 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) execve(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000740)=[&(0x7f00000003c0)='security.evm\x00', &(0x7f0000000580)='trusted\x00', &(0x7f00000005c0)='/selinux/context\x00', &(0x7f0000000600)='\x00', &(0x7f00000006c0)='bpf\x00', &(0x7f0000000700)='\x00'], &(0x7f0000000780)) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:22 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="fff300c2e3ac73052a99329102f0805ad6cd6a6ca4ff"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000580)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1002000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r3, 0x2, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x5}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x200040c0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000700), &(0x7f0000000740)=0xc) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:22 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r5, r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r7, r8, 0x0) writev(r7, &(0x7f0000000200)=[{&(0x7f0000000100)="2c913024953dc7e09a8e62978e625a636d8306a728cac6d36b5216c66384baf285ab07a0b84ed8ae0f32e76264ab8a5937e0e9e7f3", 0x35}], 0x1) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r9, r10, 0x0) lseek(r10, 0x0, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getegid() fchown(r5, r11, r12) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'ip6gretap0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r13}, 0x14) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r14 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r14, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:22 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:22 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x4, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(r1) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:22 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:22 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RSTAT(r3, &(0x7f0000000080)={0x62, 0x7d, 0x2, {0x0, 0x5b, 0x5, 0x4, {0xb7045bc25352e276, 0x0, 0x1}, 0x82820000, 0x947, 0x200, 0x6b800000, 0x0, '', 0x16, 'proclovboxnet0security', 0x9, 'threaded\x00', 0x9, 'threaded\x00'}}, 0x62) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:22 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04800000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) r4 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000580)={r4, 0x2a, 0xc1}, 0x0, &(0x7f00000005c0)="5e72217ab98be6908697a8517ed59fa65980f50e887459a2f407bd1baef20ccbcbd4e019b00ae447c255", &(0x7f00000006c0)="7f73af67c7893808c89ef8315b612f7690a7bce60cc224edf76ef21341de5075c9f1eef2de2b2b76ac523bc88132c219836f21a01032ddff7ab4022d7ab88e6b5a973e41ceffa063284b922e983b7682608412417e7b1a1432ddd46e7fef1d8b7dc4ee75332a5baebf35db0d4196e948085f5b1969125452dc61b86d522928bb2a943477b713dc54ea56371253c5b39f38c58d6c30d6858b9d24e0170d0ada215e746c863606cb0b08c09054fc30d4f29859bc042e9a34c3ce0a2f737faa4a6761") sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:22 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="04000000000000fff300c2e3b8738545668b95b205"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:23 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) getpgrp(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r1, r2, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000600)=0x0) perf_event_open(0x0, r3, 0x5, 0xffffffffffffffff, 0x0) r4 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r4, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) sendmsg$nl_route_sched(r4, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=@gettaction={0xd0, 0x32, 0x506, 0x70bd2b, 0x25dfdbfc, {}, [@action_gd=@TCA_ACT_TAB={0x94, 0x1, [{0x10, 0x1b, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x14, 0x6, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x14, 0x14, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}, {0x14, 0x19, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x1f, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x16, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x14, 0x14, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}, {0x10, 0x4, @TCA_ACT_INDEX={0x8, 0x3, 0x6c9}}]}, @action_gd=@TCA_ACT_TAB={0x4}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x18, 0x1, [{0x14, 0x1b, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4c080}, 0x80) bind$inet(r5, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r6 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r6, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r5, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:23 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="040040000000dff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) pipe2$9p(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RLERROR(r2, &(0x7f0000000580)={0x1a, 0x7, 0x2, {0x11, '/selinux/context\x00'}}, 0x1a) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) recvfrom$inet(r4, &(0x7f00000006c0)=""/233, 0xe9, 0x20000000, &(0x7f00000005c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r5 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r5, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/context\x00', 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x9}) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f00000007c0)='./file1\x00', 0x0, 0x100000, 0x0) 00:41:23 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:23 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:23 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3, 0x34000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:23 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:23 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="04000000000000ff0f91a6dc14f300b2a7cdde2db37b1f499551d2f33fe7af7d0000"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r4, r5, 0x0) getsockopt$packet_int(r5, 0x107, 0xa, &(0x7f00000002c0), &(0x7f00000003c0)=0x4) pwritev(r3, &(0x7f0000000540), 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:23 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/checkreqprot\x00', 0x40, 0x0) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000580)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:23 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x108148, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x200000, 0x1, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) write$selinux_create(r4, &(0x7f00000000c0)=@access={'system_u:object_r:dhcpd_var_run_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x4a23}, 0x49) 00:41:23 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:24 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:24 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000580)=0x4, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:24 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:24 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r0, r1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000002c0)) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x800, 0x8) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r3, &(0x7f0000000000)='security.evm\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="0400000000b500fff300c2e7b873052a9932fbf22597371392db03916ca72fb2a7cdde2dab38"], 0xd, 0x4) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r5, r6, 0x0) pwritev(r5, &(0x7f0000000540), 0x2, 0x4) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r4, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r2, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x14414, 0x0) 00:41:24 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r2, r3, 0x0) renameat(r3, &(0x7f00000003c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000580)='./file0\x00') bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r4 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:24 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r2, r3, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000000)=0x401) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r4) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:24 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r4, r5, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000002c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x3, 0x7b7d422bd8029db2, 0x7, 0x9, 0x98ed}, &(0x7f00000003c0)=0x20) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:24 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:25 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x8, 0x2, 0xc) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:25 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x69, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) keyctl$restrict_keyring(0x1d, 0xfffffffffffffff9, &(0x7f00000000c0)='user\x00', &(0x7f0000000100)='system_u:object_r:hald_mac_exec_t:s0\x00') fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:hald_mac_exec_t:s0\x00', 0x25, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x400400, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:25 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:25 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0xffffffff, 0x8, 0x80, 0xfffffffd, 0xfffc}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r5, r6, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r6) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r7, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:25 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r2, r3, 0x0) ioctl$EVIOCSABS3F(r3, 0x401845ff, &(0x7f00000003c0)={0x10001, 0x8, 0x1, 0x89e5, 0x81, 0x32ce}) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:25 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f00000006c0)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRESHEX=r2, @ANYRES16=r0]], 0x1, 0x4) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r4, r5, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x41, &(0x7f0000000580)={'raw\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000003c0)={0x2000013a, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r6 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r6, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r3, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:25 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x80040, 0x100) ioctl$RTC_PLL_GET(r3, 0x80207011, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r4, r5, 0x0) signalfd(r4, &(0x7f0000000000)={0x3000000}, 0x8) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:25 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r4, r5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r5, &(0x7f0000000580)="6c88f8dfd5a4ec8f07ee864c01219fa35784f493272099caf6251128700a54a5d5cfb8b9d0bcf79bf8d474c333dcb78257f2d7048c948c3c0d6ea2bc11e44996346c33661140fb0e9974b9028ba54550b7907551493c3d98863e86935a2bfebde8a7e791e3f761cab00a47e2c5f9936dfd02", &(0x7f00000006c0)="48a669f5244f9919d134160a9fdb5ff0521ac5f7ceb2d4a34e4b4e3dd03f007ff7618bdd0281b0f3b437c5b109e2f6fda480c76fbd9e375a311648f4ad11f8b27dda0a206b6646aaf001f8e6d2cb64ed14ed03f52bdc7d47960dc19ae0b3dae660daedd3a0c5023fee569a230ca860e6c9e898cec740d04a672224909ae475c286ac6b98ecf386171a259aef94085e3624e5e107a8f893d6728c7b9e5265338d65ad9d8a3e423447f1671cff", 0x4}, 0x20) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:25 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:25 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r2, &(0x7f0000000000)='s\b\x00)\x8b\x00\x00\x00\x00evm\x00', &(0x7f0000000140)=ANY=[], 0x0, 0x4) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r4 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000140), 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r5, r6, 0x0) r7 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$packet(0x11, 0x2, 0x300) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = perf_event_open(&(0x7f0000000040)={0x1, 0xa9b1afed135800de, 0x0, 0x0, 0x0, 0x40, 0x0, 0x50d, 0x80020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe8f3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r12, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = dup3(r13, r14, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r15, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r12, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r11, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r10, 0x0, 0x10, &(0x7f00000000c0)='/selinux/policy\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a00)={0x0, r6, 0x0, 0x7, &(0x7f0000001980)='\\wlan1\x00', r16}, 0x30) r20 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r22 = dup3(r20, r21, 0x0) pipe2$9p(&(0x7f0000001a40)={0xffffffffffffffff}, 0x80800) r24 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r24, r25, 0x0) r26 = gettid() ptrace$setopts(0x4206, r26, 0x0, 0x0) tkill(r26, 0x3b) ptrace$setregs(0xd, r26, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r26, 0x0, 0x0) r27 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r27, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r28) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r30, r29, 0x0) accept(0xffffffffffffffff, &(0x7f0000001a80)=@hci, &(0x7f0000001b00)=0x80) r31 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r31, r32, 0x0) r33 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r33, r34, 0x0) r35 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000001c40)='/dev/ashmem\x00', 0x20000, 0x0) sendmsg$unix(r1, &(0x7f0000001c00)={&(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000600), 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r19, @ANYRES32=r21, @ANYRES32=r23, @ANYRES32=r2, @ANYBLOB="1c00000000006d131622000001000000", @ANYRES32=r4, @ANYRES32=r34, @ANYRES32=r24, @ANYBLOB="00ff07000000090000000000000000000100000078803902aad76edd48bea65b08c5d2350d5a9cf49062f4c60ff05324546628d90e545932fd59704b5cc2b9021bf0487d08448b728a89cd8da633e59d5c99b1b10046dfd61f4952824cd4f9649c0377b0e8b0f7cf28152f4bbc2f34882d959de1819c0aa90934b2bdd9c3700d9c0dc877cab5d9457a0877aeae401772b86a8b60d9bb04a60ab1e593b4c9e7ad", @ANYRES32=r22, @ANYRES32=r35, @ANYRES32=r17, @ANYRES32, @ANYRES32=r22, @ANYBLOB="0000000000000000000000000100000002000000", @ANYRES32=r18, @ANYRES32=r28, @ANYRES32=r30, @ANYBLOB='\x00\x00\x00\x00'], 0x43, 0x40}, 0x80050) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000580)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @broadcast}, 0x208, 0x0, 0x0, 0x0, 0x3, &(0x7f00000003c0)='bridge0\x00', 0x9, 0x5, 0x1}) 00:41:25 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3b) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3b) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3b) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r5, 0x0, 0x0) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3b) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r6, 0x0, 0x0) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x3b) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r7, 0x0, 0x0) r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x3b) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r8, 0x0, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f00000006c0)=ANY=[@ANYRESDEC=r1, @ANYRESDEC=r2, @ANYRESDEC, @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYRES32=0x0, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESHEX=r3, @ANYPTR64], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYPTR64, @ANYRESHEX=r5, @ANYRES32=r6, @ANYRESHEX], @ANYRES32, @ANYRESHEX, @ANYRESHEX=r7], @ANYRESHEX=0x0, @ANYPTR64, @ANYRESOCT=r8, @ANYRES16], 0x8, 0x0) r9 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r9, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r10 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r10, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r9, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r9, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:25 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:25 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:26 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="040040feff1700ffe700c2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x4d, 0x25, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) r5 = dup(r4) sendmsg$TIPC_NL_PUBL_GET(r5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x16024044}, 0x36042fdf304a61a3) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:26 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:26 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0xff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000000)={0x7, 0x7b, 0x2}, 0x7) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) fsetxattr(r3, &(0x7f0000000080)=@random={'trusted.', '(system\x00'}, &(0x7f00000000c0)='threaded\x00', 0x9, 0x6) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:26 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:26 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r1, r2, 0x0) r3 = dup2(r2, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xffffffffffff8001}, 0x1000, 0x8}, 0x0, 0x8, r3, 0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket(0x2, 0x5, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r6, r7, 0x0) ioctl$BLKROTATIONAL(r7, 0x127e, &(0x7f00000005c0)) fsetxattr$security_evm(r5, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0xd, 0x4) r9 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r9, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000b86000)={0x12a65bc9f8e9d063, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) pwritev(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r9, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r9, &(0x7f00000012c0)="16008a927f1f6588b967481241ba7860056ef65ac618ded8804895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d8bf23d037a11400138fecf9221a", 0x4d, 0xc, 0x0, 0x41) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x28, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f00000003c0), &(0x7f0000000580)=0xc) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(r8, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000140)=0x1) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:26 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:26 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r4, 0xc0505405, &(0x7f0000000080)={{0xffffffffffffffff, 0x3, 0x6, 0x0, 0x100}, 0x10000, 0x0, 0x8}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:26 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:26 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7bcde2fab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) r4 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) fallocate(r4, 0x78, 0x0, 0x5) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:26 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:26 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:26 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f00000003c0)={0x7, 0x6d, 0x1}, 0x7) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x3ff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:27 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="0431b46f2e348aa907000000000111f30303d6612dd239ed4b0c"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:27 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:27 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:27 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:27 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:27 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:27 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:27 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0xfffffffffffffe36) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:27 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:27 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:27 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:27 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) pwritev(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x410080, 0x0) openat(r2, &(0x7f00000003c0)='./file0\x00', 0xd9610266cc3c2182, 0x4) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:28 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="0400003953152101c60e8f581de6ae1b07114200000000ffad00007305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:28 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x10000003b) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:28 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:28 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:28 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:28 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:28 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000340)="77d9c084f0248abacd008dc578606bc9de0d3c232719077a399c4d84958bf1d016a8f0d3237fa50a38ee3814aaf2de9260c00992af4ae9b3864121a61f13731f463a07af5ad6fc8412bb0d9dde1800d4", 0x50, 0x5a}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="7301006a5f726f6c653d45787434002c00"]) pipe(&(0x7f00000004c0)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000140)='threaded\x00', 0x5dc291) ioctl$KDGETLED(r5, 0x4b31, &(0x7f0000000000)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r6, r7, 0x0) ioctl$VT_DISALLOCATE(r7, 0x5608) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r8, r9, 0x0) ioctl$TIOCGLCKTRMIOS(r9, 0x5456, &(0x7f0000000180)={0x9, 0x3f, 0x9, 0x6, 0xd, 0x40, 0x2, 0x67, 0x7, 0x9, 0xc0, 0x78914fe1}) preadv(r2, &(0x7f0000000500)=[{&(0x7f0000000080)=""/105, 0x69}, {&(0x7f0000000280)=""/73, 0x49}, {&(0x7f0000000300)=""/132, 0x84}, {&(0x7f00000003c0)=""/112, 0x70}, {&(0x7f0000000440)=""/159, 0x9f}], 0x5, 0x0) 00:41:28 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:28 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:28 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:28 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:28 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="04000000e35faebce9e43a220000ff654c0100f300c2e3b873052a9932916ca42f"], 0xd, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r2, r3, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000580)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000005c0)={0x8}) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r5, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0xfffffffffffffd12) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r6 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r6, &(0x7f0000000540)=[{&(0x7f00000006c0)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r5, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0xfe37) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000140)=r0, 0x4) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:28 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:28 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000f40)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x3f, 0x2, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x100000000, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf39, 0x80, 0x0, 0x7, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0xffffffff, 0x0, 0x0, 0x100000000, 0x0, 0xd87e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x100, 0x0, 0xfff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdd, 0x0, 0x0, 0x0, 0x10e3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x1, 0x40, 0x7fff, 0x0, 0x3, 0xd7b, 0x7fff, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8000]}, 0x45c) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {0xbaf}, 0x10000, [0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0xffffffff], [0x0, 0x4, 0x0, 0x80000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x400000000000, 0x7, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x990, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0f, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xb55, 0x1283b05e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x116, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4, 0x40000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xb0f4]}, 0x45c) r2 = socket$inet6(0xa, 0x80001, 0x0) r3 = socket$inet6(0xa, 0x80e, 0x800000000002576) ioctl(r3, 0x8912, &(0x7f0000001140)="000000000034e026c9ef05cbcd1a8f8a8f8d77934621665e1cdd6d1591691a7e95229381fc6ed1d0cba27e019af0f8c47488389aeb55b07b19c295c605d6f6aba590f507085e29fd58197be111e510e3223a8e130e00fb265fe4b6a8e8ade875b8bde60976257b462f1e533437e2ac9b9ba82f00d4196025075b934e284aab778d287e39313b4314623efd1aca89344e9e2ff0c445c3284bc2a59ab02318c58c4543b9a4e18d0990102b11bfc3c85e887cf43b49cb8eea04ae0710393485b182033500ad49fab5cb4f12a5882836b34e252da44a1561") setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x5, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}]}, 0x310) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0x1) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000d80)) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000001340)={{{@in=@multicast1, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}}}, &(0x7f0000000140)=0x1b7) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x2000000, &(0x7f0000001440)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}]}}) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(r6, 0x11, 0x1, 0x0, &(0x7f00000003c0)) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000f80)={0x2, 0x80000001, 0x40, 0x3ff, 0x2, 0x5}) syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000002c0)={'teql0\x00', 0x4000003}) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000fc0)) mount(&(0x7f0000001080)=ANY=[@ANYRESOCT=r3, @ANYRES16=r6, @ANYPTR64, @ANYRESOCT=r2, @ANYRES64=r4], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000d40)='ramfs\x00', 0x200000, &(0x7f0000000d00)='-%\x00') mount(&(0x7f0000001c80)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80010, 0x0) 00:41:28 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x1000000000}, 0x40101}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r1, r2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000140)='threaded\x00', 0x5dc291) [ 613.274973] input input8: cannot allocate more than FF_MAX_EFFECTS effects [ 613.316290] input input9: cannot allocate more than FF_MAX_EFFECTS effects 00:41:29 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:29 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:29 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) r1 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) r2 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r2, &(0x7f0000000000)='security.evm\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="04ed9cc658474025217f6ec2e3b87a462a99912ca627b2a7cdde2dab0000cb0d21b84cb4bd8435226ee0f2d85a8df9e45c981bda47d747301e2fb40abc5e053eebbaf344d9ca60e7b5b0ac258c88a6656ea0ad7f853d76bff872d7e89fd45b6f0ac8b8bc920e937a1bb26fcbc93c4d0223558ceef30982f1824de4e73a31e3934aa703d54d8eb710a1c17456ec09be3f840dab89bd5c4102573365ba5ee1154dd7f640d4daf485d4f2ff1b4fbdd1dc7619284e3d63a84a937b3aaf4d37528600b00092b4ee20c0a87c0381150e"], 0xd, 0x4) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r4 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) close(r1) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r3, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:29 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r2, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r4 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r3, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f00000002c0)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:29 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000001a00)="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", 0x1000}, {&(0x7f0000000580)="f46dcba151e2a2a5fe663e63b166b382903bbc17ccdca6939c2440437c33a2395e33adfea9ec2f2f5541187dacc6550d83bfd3e926f1e093932d58b5a59b1d9797", 0x41}, {&(0x7f00000006c0)="c122bdf4b5953169abc9353fa2ddb5c813ff66e3fad01285b8e305ead1b4c0ca93274b77a38ffc0b7262f219d9a18e86defec1dabcd74f5cdc99c4ceb2d2814415605b56f7dfe93e52f7df5efce955e635033ab7", 0x54}, {&(0x7f0000000740)="ae5f4d863328dd1073b20a1466454c99c4ba32b8907018f39ae8542fd9b4fa5253e504042de785988bb94fbd6915a6753ec250a5c6ff0fd9b7c408a8793761d153acb7932e51b171b3eadaaac63bb5c650c5f7f8c336f98ea6f74132c004", 0x5e}], 0x4, 0x8) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b87305"], 0x1, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r4, r5, 0x0) fallocate(r0, 0x20d5dd8065bc0a41, 0x20000000000, 0xffffffffffffffff) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:29 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) r4 = dup(r3) ioctl$FS_IOC_GETVERSION(r4, 0x80087601, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000080)='yeah\x00', 0x5) 00:41:29 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000009000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:29 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:29 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:29 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:29 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:29 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="04000000000000040000c2e3b873052a9932916ca42fb2a7cdde2dab381efff73f39b4723028e576f13742b23c40dda097d85fcce9f6a8abaa06c545d28189a9eae204c7053ee078e533736b94eea454465023d863d09334"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:29 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:29 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:29 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) fsetxattr$trusted_overlay_origin(r4, &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x4) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:29 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000003c0)='\xfc6&\x16', 0x1200010, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="76540000000000fff300070000000000000089ad5bc76a1bd4c9328768d5a4feaf145fcee76f8281a5a25ce07c3750e012aea47c4926fa50a447b4e4dead4c32c58b314819e3bf1d7f250c41612d7920cb"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) ioctl$int_in(r4, 0x0, &(0x7f0000000140)=0xb84) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:29 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) r6 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r7, r8, 0x0) getsockname$packet(r8, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x5c, r6, 0x300, 0x70bd28, 0x25dfdbfd, {}, [{{0x8, 0x1, r9}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}]}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x48042}, 0x800) r10 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r10, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:29 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:30 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:30 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:30 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:30 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:30 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1290ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:30 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:30 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:30 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:30 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:30 executing program 1: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="04000000000000fff300e5ccad5fb7ad4adfc2e3b87305"], 0x1, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:30 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) lstat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000001180)=[{&(0x7f00000000c0)="02628245dc5d6950e7364b8aead1d4177e39fcfb5c83d274eb4396688c35dff6e1c472be22878709caafbcdf377247cc9558182ff11070b9ba56a89dc5573109740c1a184e11d593c2ace795b05455fd4674234413a883d33234e11600e4ba913a350f4352b48abc15c2e41f43517ad7ae99ee61", 0x74, 0x81}, {&(0x7f0000000180)="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", 0x1000, 0x1000000010000000}], 0xab1e6e7cef166618, &(0x7f0000001280)={[{@dots='dots'}], [{@fowner_eq={'fowner', 0x3d, r4}}, {@permit_directio='permit_directio'}, {@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@uid_eq={'uid', 0x3d, r6}}, {@seclabel='seclabel'}]}) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) 00:41:30 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:30 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:30 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:31 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:31 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:31 executing program 3: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r3, r4, 0x0) ioctl$IOC_PR_RESERVE(r4, 0x401070c9, &(0x7f00000003c0)={0x7, 0x1, 0x1}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:31 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:31 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x5, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) 00:41:31 executing program 5: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="04000000000000fff300c2e3b873052a9932916ca42fb2a7cdde2dab38"], 0xd, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1e", 0x43}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 00:41:31 executing program 0: mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x5, 0x4) fsetxattr$security_evm(r2, &(0x7f0000000000)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040000000000fff314c2cab87b052a9932936ca42f32a7cdde01abeacf7345e8d43800d8e7d57a7e5fccd335c3bd12559b115e8ffdce3c9009a1d1"], 0xd, 0x4) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r4 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/context\x00', 0x2, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000240)="88ff43756c3d075195e88daba8327b581512c80832dbdac660c7ca69a4fa7599ae2ea3dca3087af15c3351ad1c13f67df40f23b9970c6f43ebb19a34c4025f61cd8e1ec07a06eaf6a41990c04ebb66d8fa2f545bca0de1fbae", 0x59}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="4f7657f06eb385cd4bb55dab1dcf4faeba56d1b44a04940d56150f4b91cc101fde47079135647c010b867fdb7746fce8e7999864743059b360ad8e5989222d74a12eb0e6d8e8ebe44db859a860b15f94c5dce008e63ba116ffa96d56a1c6f2ed1815b7d790c8f22c1a5ae68d276ea127f81f45bcbc0234f11e7accf2cb3967e190de7855a34b0e7ef458bf9d7380fefe0c2e5aca87096521beb67f558ad8bc732eb090c20dc07e06949795c4a5a26975d4f48e118ca04f59b57293e1a5bc40c77d9d3abd06194627b0", 0xc9}, {&(0x7f0000000500)="a7466266dd1c48fcb43c6c6df7831d1e402819d25406366639c381adaf78180e6757563122c3dea07f3b309e7c85ec054195f40c45d35f9b89", 0x39}], 0x4, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r3, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) getsockopt$netlink(r1, 0x10e, 0x4, &(0x7f00000006c0)=""/196, &(0x7f00000003c0)=0xc4) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) dup(0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x41) write(r0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) [ 615.971942] kasan: CONFIG_KASAN_INLINE enabled [ 615.976575] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 615.983955] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 615.990173] Modules linked in: [ 615.993471] CPU: 0 PID: 25769 Comm: syz-executor.4 Not tainted 4.9.194+ #0 [ 616.000473] task: 0000000020dd97a4 task.stack: 0000000006f706f0 [ 616.006514] RIP: 0010:[] [<000000003b2dc98b>] perf_output_read+0x63e/0x12e0 [ 616.015377] RSP: 0018:ffff8801c67d7038 EFLAGS: 00010207 [ 616.020804] RAX: 000000000000001b RBX: 0000000000000006 RCX: ffffc90004746000 [ 616.028067] RDX: 0000000000040000 RSI: ffffffff813c5a60 RDI: 00000000000000de [ 616.035317] RBP: ffff8801c67d71b0 R08: 1ffff100389d561b R09: ffffed00389d561d [ 616.042591] R10: ffffed00389d561c R11: ffff8801c4eab0e7 R12: ffff8801d719d048 [ 616.049842] R13: ffff8801c67d7348 R14: dffffc0000000000 R15: ffff8801d719cfd0 [ 616.057105] FS: 00007f6de826d700(0000) GS:ffff8801db600000(0000) knlGS:0000000000000000 [ 616.065306] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 616.071166] CR2: 000000002043913f CR3: 00000001d2b61000 CR4: 00000000001606b0 [ 616.078425] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 616.085675] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 616.092922] Stack: [ 616.095053] ffff8801c67d71e0 ffff8801c67d7350 ffffed0038cfae6a 0000000000000010 [ 616.103098] 0000000000000004 0000000000000010 ffffed0038cfae6d 1ffff10038cfae15 [ 616.111146] ffff8801a47ee620 ffff8801c67d7368 ffff8801c67d7360 ffff8801c67d7118 [ 616.119169] Call Trace: [ 616.121740] [<00000000533020db>] ? perf_addr_filters_splice+0x540/0x540 [ 616.128561] [<00000000b976657d>] ? __lock_acquire+0x5e0/0x4390 [ 616.134611] [<0000000024512bfb>] ? perf_output_copy+0x151/0x1d0 [ 616.140754] [<000000006b5debdd>] perf_output_sample+0x1142/0x17e0 [ 616.147061] [<0000000051d86fe9>] ? retint_kernel+0x2d/0x2d [ 616.152757] [<00000000e1f30450>] ? perf_event__output_id_sample+0x80/0x80 [ 616.159764] [<00000000c4e8be4f>] perf_event_output_forward+0x129/0x240 [ 616.166502] [<000000001c943ef2>] ? perf_prepare_sample+0xeb0/0xeb0 [ 616.172887] [<000000001c943ef2>] ? perf_prepare_sample+0xeb0/0xeb0 [ 616.179283] [<00000000ca656995>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 616.186107] [<000000009987a69e>] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 616.192681] [<00000000c42c7565>] ? __this_cpu_preempt_check+0x1d/0x30 [ 616.199326] [<000000007098d87a>] __perf_event_overflow+0x121/0x330 [ 616.205713] [<00000000988f9cc8>] perf_swevent_overflow+0x17c/0x210 [ 616.212280] [<000000002493fa15>] ? check_preemption_disabled+0x3c/0x200 [ 616.219096] [<00000000bc9b22e9>] perf_swevent_event+0x1ac/0x280 [ 616.225218] [<00000000987e7b48>] ___perf_sw_event+0x299/0x4c0 [ 616.231168] [<0000000075f9cac0>] ? ___perf_sw_event+0x112/0x4c0 [ 616.237303] [<000000003a0a0196>] ? trace_hardirqs_on+0x10/0x10 [ 616.243349] [<000000008a7ecc4f>] ? perf_pending_event+0xe0/0xe0 [ 616.249487] [<000000002493fa15>] ? check_preemption_disabled+0x3c/0x200 [ 616.256304] [<0000000051d86fe9>] ? retint_kernel+0x2d/0x2d [ 616.261994] [<00000000f81b94a9>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 616.268747] [<000000006fecf581>] ? handle_mm_fault+0xc10/0x2420 [ 616.274869] [<00000000dad66feb>] ? handle_mm_fault+0x501/0x2420 [ 616.280992] [<00000000257cf424>] ? _raw_spin_unlock+0x2d/0x50 [ 616.286954] [<000000009f9be8bf>] ? handle_mm_fault+0x546/0x2420 [ 616.293076] [<0000000032397163>] ? vm_insert_page+0x850/0x850 [ 616.299026] [<00000000f81b94a9>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 616.305757] [<000000002493fa15>] ? check_preemption_disabled+0x3c/0x200 [ 616.312575] [<00000000544892de>] ? debug_smp_processor_id+0x1c/0x20 [ 616.319058] [<000000007856b2b3>] __perf_sw_event+0x47/0x90 [ 616.324773] [<000000004506d776>] __do_page_fault+0x6cd/0xa60 [ 616.330635] [<0000000063713d4c>] ? bad_area_access_error+0x3d0/0x3d0 [ 616.337195] [<000000006e0b4e1c>] ? ext4_reserve_inode_write+0x180/0x180 [ 616.344013] [<00000000040c4c7d>] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 616.350659] [<000000007d7eb53a>] do_page_fault+0x28/0x30 [ 616.356172] [<000000009f529155>] page_fault+0x25/0x30 [ 616.361425] [<000000005a9511f3>] ? iov_iter_fault_in_readable+0x300/0x3d0 [ 616.368417] [<00000000e7d23089>] ? iov_iter_fault_in_readable+0x30d/0x3d0 [ 616.375408] [<000000005a9511f3>] ? iov_iter_fault_in_readable+0x300/0x3d0 [ 616.382411] [<00000000bf9ef825>] ? iov_iter_init+0x1d0/0x1d0 [ 616.388284] [<00000000267ee670>] generic_perform_write+0x1b6/0x500 [ 616.394666] [<00000000b71832b6>] ? filemap_page_mkwrite+0x280/0x280 [ 616.401150] [<0000000057e51f93>] ? current_time+0xd0/0xd0 [ 616.406754] [<000000009dbdb570>] __generic_file_write_iter+0x340/0x530 [ 616.413495] [<0000000031c8eef6>] ? generic_write_checks+0x245/0x410 [ 616.419966] [<00000000435740e3>] ext4_file_write_iter+0x364/0xcd0 [ 616.426263] [<00000000edb1d3cb>] ? ext4_llseek+0x8e0/0x8e0 [ 616.431952] [<000000002493fa15>] ? check_preemption_disabled+0x3c/0x200 [ 616.438781] [<00000000ca656995>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 616.445600] [<000000009987a69e>] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 616.452156] [<000000002940a206>] ? iov_iter_init+0xaf/0x1d0 [ 616.457936] [<0000000005d6bbc2>] __vfs_write+0x3c1/0x560 [ 616.463453] [<00000000f50596e9>] ? __vfs_read+0x550/0x550 [ 616.469056] [<00000000ae8ac700>] ? rcu_read_lock_sched_held+0x10b/0x130 [ 616.475873] [<000000005742ab80>] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 616.482430] [<00000000e74e5814>] ? __sb_start_write+0x161/0x310 [ 616.488553] [<000000009d8396ea>] vfs_write+0x185/0x520 [ 616.493894] [<00000000e378ae2b>] SyS_write+0x121/0x270 [ 616.499238] [<000000006dc5d50c>] ? SyS_read+0x270/0x270 [ 616.504667] [<00000000d35287e8>] ? task_work_run+0x149/0x180 [ 616.510531] [<0000000006a18275>] ? do_syscall_64+0x4a/0x5c0 [ 616.516307] [<000000006dc5d50c>] ? SyS_read+0x270/0x270 [ 616.521736] [<0000000057b34681>] do_syscall_64+0x1ad/0x5c0 [ 616.527425] [<00000000ad91ea87>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 616.534327] Code: 74 08 3c 03 0f 8e 55 0a 00 00 41 83 bf 88 00 00 00 01 0f 84 09 07 00 00 e8 a0 cc f5 ff 48 8d bb d8 00 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 30 00 0f 85 15 0a 00 00 48 8b 9b d8 00 00 00 48 85 db [ 616.561651] RIP [<000000003b2dc98b>] perf_output_read+0x63e/0x12e0 [ 616.568186] RSP [ 616.571964] ---[ end trace f417371dce660f73 ]--- [ 616.576730] Kernel panic - not syncing: Fatal exception [ 616.582667] Kernel Offset: disabled [ 616.586284] Rebooting in 86400 seconds..