inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(0x0, 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:45 executing program 1: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:46 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(0x0, 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:46 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:46 executing program 1: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:47 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:48 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x30, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa244634167"}, {0x10, 0x0, 0x7}], 0x40}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:49 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x30, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa244634167"}, {0x10, 0x0, 0x7}], 0x40}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x30, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa244634167"}, {0x10, 0x0, 0x7}], 0x40}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, 0x0) sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x30, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b27"}, {0x10, 0x0, 0x7}], 0x40}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:50 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, 0x0) sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, 0x0) sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:51 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:51 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:52 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:52 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0x0) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:53 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:53 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0x0) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0x0) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(0x0, 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(0x0, 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(0x0, 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:54 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:54 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setreuid(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setreuid(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:55 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:55 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setreuid(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, 0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:56 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, 0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:56 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', 0x0, &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, 0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) setreuid(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580), 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) setreuid(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580), 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:57 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', 0x0, &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) setreuid(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, 0x0) sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580), 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, 0x0) sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, 0x0) sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:58 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', 0x0, &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:59 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:16:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:16:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:00 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:00 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(0x0, 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0x0) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0x0) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0x0) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:01 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(0x0, 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:01 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', 0x0, &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) [ 1028.105300] audit: type=1400 audit(1572092221.488:340): avc: denied { map } for pid=18641 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 12:17:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:02 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(0x0, 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:02 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', 0x0, &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:03 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, 0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:03 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', 0x0, &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, 0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, 0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:03 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580), 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:04 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', 0x0, &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580), 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580), 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:04 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(0x0, 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:05 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', 0x0, &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:05 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(0x0, 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:06 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', 0x0, &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:06 executing program 2: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:06 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(0x0, 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0x0) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0x0) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0x0) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0x0) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:07 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:07 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:08 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:08 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:08 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x50, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383"}, {0x10, 0x0, 0x7}], 0x60}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) 12:17:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:09 executing program 5: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:09 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:10 executing program 2: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) socket$inet6(0xa, 0x802, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2) write(0xffffffffffffffff, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:10 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:10 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) socket$inet6(0xa, 0x802, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2) write(0xffffffffffffffff, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:10 executing program 2: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) 12:17:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x10}, {0x10, 0x0, 0x7}], 0x20}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00'}) 12:17:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x10}, {0x10, 0x0, 0x7}], 0x20}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00'}) 12:17:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x10}, {0x10, 0x0, 0x7}], 0x20}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x10, 0x0, 0x7}], 0x70}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:11 executing program 2: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:11 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) socket$inet6(0xa, 0x802, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r2) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r3, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r5, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r5, &(0x7f0000000840), r3, &(0x7f0000000880), 0x3, 0xc) write(r4, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00'}) 12:17:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:11 executing program 5: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) socket$inet6(0xa, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) write(0xffffffffffffffff, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:12 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) socket$inet6(0xa, 0x802, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r2) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r3, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r5, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r5, &(0x7f0000000840), r3, &(0x7f0000000880), 0x3, 0xc) write(r4, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:12 executing program 2: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) socket$inet6(0xa, 0x802, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r2) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r3, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r5, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r5, &(0x7f0000000840), r3, &(0x7f0000000880), 0x3, 0xc) write(r4, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:12 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) socket$inet6(0xa, 0x802, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r2) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r3, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r5, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r5, &(0x7f0000000840), r3, &(0x7f0000000880), 0x3, 0xc) write(r4, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:12 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) socket$inet6(0xa, 0x802, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r2) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r3, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r5, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r5, &(0x7f0000000840), r3, &(0x7f0000000880), 0x3, 0xc) write(r4, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:12 executing program 2: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) socket$inet6(0xa, 0x802, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r2) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r3, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r5, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r5, &(0x7f0000000840), r3, &(0x7f0000000880), 0x3, 0xc) write(r4, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0xa808) r2 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:13 executing program 5: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) setreuid(0x0, 0x0) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) socket$inet6(0xa, 0x802, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) write(0xffffffffffffffff, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:13 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) socket$inet6(0xa, 0x802, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r2) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r3, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r5, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r5, &(0x7f0000000840), r3, &(0x7f0000000880), 0x3, 0xc) write(r4, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:13 executing program 5: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) socket$inet6(0xa, 0x802, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r2) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r3, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r5, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r5, &(0x7f0000000840), r3, &(0x7f0000000880), 0x3, 0xc) write(r4, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}], 0x60}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:13 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) socket$inet6(0xa, 0x802, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x4, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r2) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r3, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r5, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r5, &(0x7f0000000840), r3, &(0x7f0000000880), 0x3, 0xc) write(r4, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}], 0x60}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r2) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xa808) r4 = socket$inet6(0xa, 0x802, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xf, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) fallocate(r0, 0x2f, 0xffffffff, 0x9) clock_gettime(0x0, &(0x7f0000003840)={0x0, 0x0}) recvmmsg(r5, &(0x7f0000003600)=[{{&(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000080)}, {&(0x7f0000000100)=""/149, 0x95}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/173, 0xad}, {&(0x7f0000000380)=""/132, 0x84}, {&(0x7f0000000440)=""/149, 0x95}, {&(0x7f0000000500)=""/137, 0x89}, {&(0x7f00000005c0)=""/72, 0x48}], 0x8, &(0x7f0000000700)=""/43, 0x2b}, 0x10001}, {{&(0x7f0000000740)=@can, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000800)=""/199, 0xc7}}, {{&(0x7f0000000900)=@tipc=@id, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000980)=""/163, 0xa3}, {0x0}, {&(0x7f0000000b00)=""/84, 0x54}, {&(0x7f0000000b80)=""/106, 0x6a}], 0x4, &(0x7f0000000c40)=""/7, 0x7}, 0x5}, {{&(0x7f0000000c80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000d00)=""/170, 0xaa}, {&(0x7f0000000dc0)}], 0x2, &(0x7f0000000e40)=""/225, 0xe1}, 0x6}, {{&(0x7f0000000f40)=@generic, 0x80, 0x0, 0x0, &(0x7f0000001500)}}, {{0x0, 0x0, &(0x7f0000002900)=[{&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f00000007c0)=""/55, 0x37}, {&(0x7f0000002600)=""/81, 0x51}, {&(0x7f0000002680)}, {&(0x7f00000026c0)=""/143, 0x8f}, {&(0x7f0000002780)=""/43, 0x2b}, {0x0}, {&(0x7f0000002800)=""/251, 0xfb}], 0x8, &(0x7f0000002980)=""/163, 0xa3}, 0x401}, {{&(0x7f0000002a40)=@pppol2tpin6, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002ac0)=""/98, 0x62}, {&(0x7f0000002b40)=""/211, 0xd3}, {&(0x7f0000002c40)=""/2, 0x2}], 0x3, &(0x7f0000002cc0)=""/82, 0x52}, 0xff}, {{&(0x7f0000002d40)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f00000031c0)=[{&(0x7f0000002dc0)=""/255, 0xff}, {0x0}, {&(0x7f0000002fc0)=""/241, 0xf1}, {&(0x7f00000030c0)=""/47, 0x2f}, {0x0}], 0x5, &(0x7f0000003240)=""/4, 0x4}, 0x1}, {{&(0x7f0000003280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000034c0)=[{&(0x7f0000003300)=""/104, 0x68}, {&(0x7f0000003380)=""/9, 0x9}, {&(0x7f00000033c0)=""/155, 0x9b}, {&(0x7f0000003480)=""/13, 0xd}], 0x4, &(0x7f0000003500)=""/231, 0xe7}, 0x3f}], 0x9, 0x40014060, &(0x7f0000003880)={r6, r7+30000000}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004b80)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x005t\xea\xdca$\r\x01\xf4\x10\xfd\xf0\xcc*\xf3r!\x04\xe5\xc1@\xf8\xee\xe2\xab\xe2\xc7s\x04\xc1y\xe7\f\x9a\x7f\xd9\xb2\xfb\x03\xf0\xe6\xc3O\x1ai\xa6\xc0\xfd\x9f\x8b\x13\f\x13M\xaf\xf1\xd0\x81Z?F\xfbM-^a\'\xed\xfe\xcc\x9b_\x83\x99f\x93C\x8f\'g\xaeq\x92GFu[\xf5\xd5\xf0\x924(\xe1\xdc\x81\x86C\x7f\xb1\xc4\xfb\xb3e\xa4\x94\xfcYI\x03\xaf\x19\x9bp9-PG\xe5\xf8{v\xe0\xbb\xe4\xef[\x9b\xc3\v\xc6;4\x18\xbb\x83\xdc\x13q\t`\xf1X!\xf5\xb9\xdc\xf6 \xc4\x04\xbe\x14\x16DI\xa1<\x97\xecb\'>f\x8c\xd0\xb0e', 0x1, 0xc3, &(0x7f0000000240)=""/195, 0x0, 0x0, [], r10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) sendmmsg$inet(r8, &(0x7f0000005640)=[{{&(0x7f00000038c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10, &(0x7f00000049c0)=[{&(0x7f0000003900)="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", 0xfe0}, {&(0x7f0000004900)}], 0x2}}, {{&(0x7f0000004a00)={0x2, 0x4e23, @remote}, 0x10, &(0x7f0000004b40)=[{&(0x7f0000004a40)}], 0x1, &(0x7f0000004bc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_retopts={{0x14, 0x0, 0x7, {[@noop]}}}, @ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @broadcast, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast2}}}], 0x88}}, {{&(0x7f0000004c80)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000004ec0)=[{&(0x7f0000004dc0)="e81e3ae3ca86a2d711044f829ce3c8d7f26b8d1a5993167ac96f12ff08542dcca54b0c7ed6310778e766aa53dd4e0bca0272aedcee137481d568bf3644578070", 0x40}, {&(0x7f0000004e00)='Y', 0x1}], 0x2, &(0x7f0000004f00)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0x18}}, {{&(0x7f0000004f40)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f00000051c0)=[{&(0x7f0000004f80)="933800dc3c82afb9eb2faeb238a590d1408c39c9073be60bbeecdee5d325567de77a4a87dcc6d6792f2153398384e04e68a971d9a8c658f56e84d7fe60e2fea45d8bb7", 0x43}, {&(0x7f0000005000)="b930", 0x2}, {&(0x7f0000005080)="009fe7a8eb9fad44c898005b427e2db2cf2ede36a848817cb251757b9a9e45a07584642ae4a853edcb1e5cde2db0e4b2", 0x30}, {&(0x7f00000050c0)="268d8d4018100a2586eb0d95b872c41210a1edb9c74de9b65e73ab9ab98b6b51351d50a898d8a5620eb5cf76fecdfdbd9fbe11193cb87c336b245d2dcdb904b40711d4bce9ac17d05d2378d582f9794bea2f69714cf3c2965016baa24a7563ee4c1685ee9710ceb64e7763b285e84acfda40858c802e6050ee38f25d8557378f618381c8b7323ad18f38074a3e6af878dc0067a3b495ad68323edc9d1ba74cd6645ad6ef89027073dc6bccd0e6921389b0e51e0153c0e018c2e1219636adc4ce3febf6b4f577151d8ff6ca594391938af74a5951e3a5734965afafacecea55bbc67a1f08cd8f", 0xe6}], 0x4}}, {{0x0, 0x0, &(0x7f0000005580)=[{0x0}, {&(0x7f0000005300)="502a84fdce7017c216a53206419677a5b69af66baebc68ca3b3f887850473f37a408950fca8ef40d6d67c0496a57c1ceedd84036ce2d80f0fe70e92b8978278a8f7376359abe", 0x46}, {&(0x7f0000005380)="fbbcb790906dcf0edc8c094b38c5472a6bd347d1bb4b90fa4ac1922283fc166c83b81a289900eb8e5f967860008c650fda4ba397c93309b4753438b53e9aaf03edefe690df3aefc2618619efc1ace2638a8e5fb9dc73937375aceb29164bd624fa0071b95b469f99f4eb2b7e9b", 0x6d}, {&(0x7f0000005480)="5c11c08b6beb4f698c39778cd34fdf9656bc3b6c6355e5b0cf241b7307eaa9087329d4c29937c8c56412a8d4e053c052e3a5e4289ce1cae4dabe393723b596f12ab23642bcc3749a57f299279e77a86871b3518a66b9b35c2adde191360d34c3b4a6407d8335e73c368de3fb7cdc2c23af3dafc2835bb0cc36a3777918620a18c0897ca31f07ccebe9f82f8417ba45f4c1de3e9587658ee73616cff928595ff7093ccc955ac13a012963d3ed3fb683b082b70a89810938b5e68677ba77fd9d56bc9660de1fdbc1e37c8a233f20127f139fe1b063439cfa3a9c65e2489ba2ec7e36b779b9534f35ce820638a79ace", 0xee}], 0x4, &(0x7f00000055c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @multicast2}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r10, @multicast2, @remote}}}, @ip_tos_int={{0x14}}], 0x58}}], 0x5, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000002880)={@remote, 0x0}, &(0x7f00000028c0)=0x14) sendmmsg$inet6(r4, &(0x7f0000008280)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="07e33e76b559294cfbb219993095f2", 0xf}, {&(0x7f0000000800)="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", 0x1000}, {&(0x7f0000000280)="2944eb89aef1f084813dac951df47dda5ba1d1817a6df3b8397ff6bcdaa7a3d8c4b6e68785be5feefc999476c2dc06ff07eb568e1cdc4b2dffc31e63d539b5bf9d2e1baf0c9c230ed7aa48bf5df4b6d60c0be5f479f4e6df10021dd765e1501c7eaa910c017979a60a7922bc50b4617dfdb24a159596fe5a5b972208b6d146486a3b0efc4700bbbd7e4fb94362fda1655a5b956d1532aac0418c88b8077f39c30a0f1d436801a7b07590e06d805a6f9fe7908a4f5de13c0df979f54ea99d0517d4a90b27bd", 0xc5}], 0x3}}, {{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="1a55c305b5e205ce137e6c88d288ccef368056a3b5e662c65df451c945385325a2c526529d0e0d3a6b4c7864a0cef76f3abdfc7d03d726d09f0f14ac71db0bdbb9a37f20d064c734a8bd8bf3efb21d4361808d8c33fa646aa94d5b2e890b6cfd8385c6ad5ef8a0ebd6ac887b3ce43f7e26ccefe7c04670298bcf9821d21d9a4c5d9b34fc398dce39", 0x88}, {&(0x7f00000001c0)="9a4f2364a1228c74744b9ae3c8001fe5032e9a0c162284c22274cdf69b98e5d2a33cffa8b1404fc40ccf676fb6fb984783f8471fb8e9b8970e76c5e6d9368525292cd412be70ad44b7009eeba329a10377ccc3a4", 0x54}, {&(0x7f0000000480)="7725b56e78550faf748a40aa30f0cb37115dcdbf68f565cdb517cecb5e76aa041019b1bcf3792e0ea7556ddf8a4ae0115dea8ab810c996944b5e13101b88a4544cef40f9f8d593294cb7bb6ba5fb9761acb2b9daf271e8c56d246e7a750efaf182d73f5fd9a9c813d14d5671e8373646123baf9f37fa42ca86da51808c835793356939af0fbfea37a2d433c64f64141c9b60aa6aa4b67a60f6c1c2de189a59b2bb8ff4447fb4b6951458ce511ae4f014615e4024177c2a722dd6d7fbb98195a067d0151c1b5d35f3d81e822456e7bdc65d87d85a557b5af8d3ce3cd0756b8e464ecbf825f58c9347c5464617aaf5f2", 0xef}], 0x3, &(0x7f00000005c0)=[@hoplimit={{0x14, 0x29, 0x34, 0x2}}, @hopopts={{0x38, 0x29, 0x36, {0x3b, 0x3, [], [@ra={0x5, 0x2, 0x41}, @jumbo={0xc2, 0x4, 0x40}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x3}, @enc_lim={0x4, 0x1, 0x8}]}}}], 0x50}}, {{&(0x7f0000000100)={0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x23}, 0x7}, 0x1c, &(0x7f0000001b80)=[{&(0x7f0000001800)="3b7aeacc25a42722ec488176b845202626fb41548ceb9cc82308dd1856fe5e3c60d73ad9c2489bd9265606009342442a4f5325d3669e64c91eacff0856804a86971e04936514d3fa028cf94cc81eb56d4b78ae5358631d70c304ad36ea509b756cb33b01e70d86ebf2293a6e386eb7a50f03f2c5968fb94d5258552fbe661a141fc4ca428533d92dd487703431c20859bf3ab5661d88f43f1a02232c9bca7987c5ab9122612aef22da6d8473bb8079462b28e2740fb37c4f9b", 0xb9}, {&(0x7f0000000640)="0f12684e805b2b689763e0640791269cb1c20bcbf79ccbf4e4203816b6fc279bd0eba6af93837c12afae8600bc8d", 0x2e}, {&(0x7f00000018c0)="c3c5e2125ea12c927dac14a7d0693883767fced095d3e62158cea9bdcddfffc3403c99efc19f14f8fab6e6939a8d39775730c34fc7feb8214f8f72a3127f02cec576b34b104cc51a6d788ca55d6764ce53ab3a8f1d093ca131fcdb7323bc19ba1374c4b5a5c55901459f1eda14eae4d6802e7e04dfc30d66687ea51417519d76", 0x80}, {&(0x7f0000001940)="089600f2bc53b3818253d6ec281361298dd57017331105c84744da2c6e1d40c4dd33951898f71b10641b9aace4d1fa029b8ac090b79e157897ad378c654ada3971fd4d6656287a5336f608e41d26242fc08c1ea336eecb17a84df20c2253921c04156f8336e97ec5551cf285ddd5d988f5", 0x71}, {&(0x7f00000019c0)="cbdfd9b9ab5663f7b1ed0604e4875c9b95d4056dbd82eb0025db18413d0b326f6963f317a2ee1e3531a86b0b61175b1a2d3803c39b5d45133c55b52f1048569ce86d8e2699ba1fdefc5eea955b5f4812320be99829ce1e75d1153ff082d466cbc97ed4fa32d2127773e628a8c6f3451aea920511236470376e7accb03ea071ebfd28678b665c8ba229f7a75479453450f80231a1adf130a79bd420a8494370c23a", 0xa1}, {&(0x7f0000001a80)="d889546a2f6d3eb07cb2a8d6b598da2375474d31adb9a4d7e2e2c6fb2d6cf11e9d5d6762ca993e457b4add19f3d50fd87d45e322dd01bf46ecadfe3573dc136c7d71654153d5cb3432b351b433f03b1e6ffd7db1733d68b2e0cf57f5b71017534dc5512448e52f99c2abd0e72ac01ff4bcce83fec22b74ccb076aabdc684f6dfda42f6a7809e2144691f7f4222e5b28f4e1f1c2e4899f7ec678d80f37e0d9d0a54c2f9f7d64821accbdb3c3abd20834422c055efc9a30d7e19d871f7c0b80ba626a21b9f3997f8524f2301f94875927bca9c0a95eef3b4f83e", 0xd9}], 0x6, &(0x7f0000001c00)=[@dstopts={{0x20, 0x29, 0x37, {0x2c, 0x0, [], [@jumbo={0xc2, 0x4, 0x5}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x9}}, @rthdr={{0x48, 0x29, 0x39, {0xa1, 0x6, 0x0, 0x20, 0x0, [@dev={0xfe, 0x80, [], 0x25}, @ipv4={[], [], @broadcast}, @empty]}}}, @rthdr_2292={{0xa8, 0x29, 0x39, {0x3b, 0x12, 0x2, 0x1f, 0x0, [@rand_addr="cc8acc3388413ee3f81843253e584382", @mcast1, @mcast1, @local, @loopback, @remote, @dev={0xfe, 0x80, [], 0x16}, @rand_addr="5e8d54b4ff590aa2cb85c638b8826249", @local]}}}, @rthdrdstopts={{0x128, 0x29, 0x37, {0x87, 0x21, [], [@generic={0x6, 0xe8, "7135f542e8ca23833b88853f39b6a1f35be8489c64e6c9fedd00e541d82dd5e32714cda5cde2d087c3b530eefc5bdd412c3f81dbb6fc02d710b6dcfcd3f2274748d7cdafd01616967d081a97da2f9b85b806dccfa7f205757407cbc526c92911a3417a52d8355d81936a5d3c8d356ae9d13c3e5aff16109ab4069f757cd8212516a08a2dda2304c77a9cd774daa7b545d19261e4f01556648b30618a209da4d3a3c614ac020b402060d10804ad17a449b76109e5836ec113a0d9dd0ec496b2b86ace8110d2bcfaee943aefa858f128be2a6b358a4c92895a8f5046b414281520767d2f25cebb0b4c"}, @enc_lim={0x4, 0x1, 0x72}, @hao={0xc9, 0x10, @local}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @rthdr={{0x58, 0x29, 0x39, {0x14, 0x8, 0x0, 0x7f, 0x0, [@ipv4={[], [], @empty}, @mcast1, @dev={0xfe, 0x80, [], 0x18}, @empty]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x101}}, @dontfrag={{0x14, 0x29, 0x3e, 0x4}}, @tclass={{0x14, 0x29, 0x43, 0x8}}, @dstopts={{0x100, 0x29, 0x37, {0x2e, 0x1c, [], [@generic={0x7f, 0xc, "6b585af2a07cea8d97cb59cc"}, @generic={0xf1, 0xbc, "fc4893c1e77da7c9398b96fd1e837b31519c5769b0323a8cc2a5000b1fb924df9b964154ddc4b54f0fccdc5587171ad5354666a3908d32143c80d09a1b1cece8abdaa6ff410137bd5bb9fc680a349b356f6209eec85c4ce96c304640bf72dd5d0cff522f4119a9469b8078b3afdfa655bddec2089a7a139119d1a49916ece27895cc449bae587aeefea37ee4bec124c6ef81680a87b02fd8bb89c8560a1ee390b791875013d7df8ef78838760e377b69a2603302fafe813390efa360"}, @pad1, @enc_lim={0x4, 0x1, 0xff}, @jumbo={0xc2, 0x4, 0xffffe90a}, @enc_lim={0x4, 0x1, 0x1f}, @jumbo={0xc2, 0x4, 0xb5}]}}}], 0x3f0}}, {{&(0x7f00000006c0)={0xa, 0x4e24, 0x3f, @dev={0xfe, 0x80, [], 0x16}, 0x10001}, 0x1c, &(0x7f0000002100)=[{&(0x7f0000002000)="537e30730eb34ab99be86ebe0929ad61d2a4c76c16fd7003e702ef2c895907cb179637665646b0177c64f07ae4323486caad7d67c81893f4a34b6aa91d81c699f58c31483db447692fe82ea717e3f2e99cb9c2f03c7c4a1bce978a54812011116bdd62687e62cf28120f355958e300ec2f35425dd3c2ac76e5d4d0ea6185eb1d0054d4ef5cbda119890df1f3c9afb6770f52b9d10b154b30eec8a558c3b6502308b605d7cd95b811b9f8582d9bfad0329093c3d2a7b0e4e0e33c0e2d812e704061", 0xc1}], 0x1}}, {{&(0x7f0000002140)={0xa, 0x4e20, 0x8, @mcast1, 0x7}, 0x1c, &(0x7f00000027c0)=[{&(0x7f0000002180)="3ad8d4e3718549ba8079000831bd8bd2b501ce28fc5b0f412c17db0ded0e95727873b083698bc40b9465fd981ce1c4a48b8cb81e305bec35de62591f80c9a7988da7479455657c955b07dc6db32ccd98ffbaebb19f91f1d3fae7ca", 0x5b}, {&(0x7f0000002200)="8d112abb8fb508ac1e1fa5ad1389050e3860afb7c304102243838323fda20a7c0e5d8009e6208373aee6e44d83d8b9241355592e8873059b43630734cb18b09d5ceab71041791108e087c677973a9878fb86b1b02571789fc15247bb7780e9f0b65509de8c0ee69c9f22eaf8b8130d4c098ca7c50e63f85185926bbff3a029e1a17eea3f99ed0dd72d3f8fe5f214c1592b7b64b4c2dc61", 0x97}, {&(0x7f00000022c0)="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", 0xfe}, {&(0x7f00000023c0)="ecb9b4c0383fff4b4e1647c77ed51ad22f0bd75eda4073e654656f6fbfbcc3876e1d91c37e8a5508577b74e2c89e033f14b71940ca1b8e9f891952a97a6f7e89a55c19d3c5b1d99b2832182ffb46e2778e0e0acc722d0c7c368bb6da0fc024f0cbdb105cf78fe66718955fe7f23e1add0d11db073da384a7202f3c24a0fb1c657e", 0x81}, {&(0x7f0000002480)="46b8883c511ccf18428d706c", 0xc}, {&(0x7f00000024c0)="55f5acc923083d9da2370754240e16b27a945ca49d13d368754a7aa15b89be17ae16550ad0303857736da4aec0659c14a956d9447c6ae8fd20cbb7773b19b745bd06edcbfeb55fdec97b951770813202a7d6b0a0a86ad179e3afb61da668b3ee59717f75cf9f704ccab76dc4", 0x6c}, {&(0x7f0000002540)="eef3cb3cabc1f5bca985cf81ceda1827512cbbbff1af71c08ee689d11dd549b0f4c7142f4a5273634b0c0ee2a6bc40812bdecc0b311a16bb74c6685b09c333b4e0fbe14805cd38772729d6b9ff647cb91d73fe40158e5e0494edf4f98791914bcfc131678ea93ceed3624bde5c366c4329ace9598f9e24aa3af5342c7a046195ca3c9d83ff02fff9771c1067ced0ce6caddfa9d3b4392610d7b40da9fa38d305ba0a6a4a40f910eb138df9470a3a13ccaae62622a0568b757ded0ead87aa04d370e87cbca61110f9ca1263bb4769e5634e5ab9207bdde2f7667ffcd2c7018b8de84dfb9e3dea6bfcabaf3f3c", 0xec}, {&(0x7f0000002640)="3220c6becd7cdfbc7a9f5e2902636e0aeafbab6488c4fb8780eb1d7e91073222d1b5b70c8c18ddb5686941575c87fc1ac7f5de4802b14d7d18f8a07bd655adce757748e8b3b3fc48e3631b4467c781f175df55f96d212e61452f7d83cb50dd01892332ef92fc4965b56621313a3bec1d307956b2fe8c64a4a5cc12c30eccb79c69a9a902a54de30eab5d931f0f66cb54fd06a8363f61e71a988d0293376b8ebb7bd6", 0xa2}, {&(0x7f0000002700)="22891c51a2f18c8ff1742ce73f7290836fdc6c3f3fd2fbef218847ded12c3777c67784c6c6234d1e38d61524", 0x2c}, {&(0x7f0000002740)="0c89b8ebeb5c702b298b95bce0dbad8c0164c6414d1e6a0e8021c532f7709413425dccf9b20fa90d6d3ed525f8e2ddf9c5c24627089fe2b69360592454acb423626a90b324f0e9d8cb5ded2d219811006f59f434dff459c12c526dcf377b0b91500982c5b38934f8cf97a0b35f85fccb140166ac5b", 0x75}], 0xa, &(0x7f0000002900)=[@rthdr_2292={{0x38, 0x29, 0x39, {0x6c, 0x4, 0x0, 0x3, 0x0, [@empty, @mcast1]}}}, @pktinfo={{0x24, 0x29, 0x32, {@loopback, r10}}}, @dstopts_2292={{0x1068, 0x29, 0x4, {0x2c, 0x209, [], [@enc_lim={0x4, 0x1, 0x80}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @remote}, @enc_lim, @calipso={0x7, 0x8, {0x7f, 0x0, 0xfc, 0x1}}, @ra={0x5, 0x2, 0xfffb}, @generic={0x1f, 0x1000, "dd80d6609583f5c1fddbc4489b4a967bd8685ee337672cbcfdf225c8b8781be27a374452e9d74602775efd7cdbd0189bb25792041d0e0f63103d5f027212489b5a7ff4f71b878a1f1dcdec9e1311e7077b32ceca348d0801d0ca113374eaa151771658a78b560b433f6e70b77ebc95a01c5e36c66c69d76dc695c69218e33eebc4cfa7f13994c50c4af130c8ec1a2fca1ca19f969bd7266cb20fdb7d624b24849209cbb17937c3a2d2a96f8c1594bf54370fcd4a58525ec9aeac9a034566552fcf64bfd2a646de8174b20cc27a0931f5bad764646a37d35d5f7c3c5fe838fdc88ff1694931a69a2cf6005ea090a8006a4a01892e7d65b6608973e37eeb0521637fb316c2765ecec6d76c91c29107aa8a5eea82b527f28eb78eb0ba85a69b75a1b1cb6fcfc481b2a131a8d8985e3d4b8ea5a421795f1af9453c060f0c906c62237dada911fd7988ea927810d49f0627276abd8e683a8bcf6cd8dd75385d0a46798387bed2a96ec6a927f36a63c0718edbf52ef500e7de40df7fccf45bc0560401364ea84052543eff64205ce4d3e5989e03c98d2912f4394e657d1dd2d986a78f364f05604e5b4471b2a80a0011cae46ee6b2673e029aa792db8278486a82e8b627f37b9dde04f5c810d466196d2d57288bf08c0f0fad496f6e3b340984feae974d52f7362d2abcbf4fbdf6bda3c43aa5cc57199cdafc88b3206fc2095a663777fdeacf55eee28406499beddfc4329ca201d51849e140b86c41aa1968b1b72284d28bb8540462cc0a2ac923481d93d3b15d20606161930d99e95f37e70bfe0e590fbaace3ea5ffeadd454c8b92228d5d1a6e3e8304211fa1c8167ff76449c6705a7401e23ec2f4ccc489d261082f4861fe1e16af63ad62bc39b4dbc23dbdc5309123a81ded72ee1b73e7d48d02cd8f2b759c853c54e61b84f3cc323cef71b80f21df7c0a9b19c13561c511c30e3c18d22c1051a39ee575d143cc3dc7feab31b5b853e5af3940ddde7014c3af605ff2204145db9e807b671bc5dd6667efdac191cf732e1c6a4d5ba93619f042123b4c9ca39ece8930e54966fce2b3b5908c848cdaf980893d49d9f5b5d8ffbd89e19bb6e87ca3528a74dac32b2e49e334519626c07c1a7bf90bfc22d1e4d6d9371e3addc5b36f0228bd7bf2b8766280c801a5c63a3c7699108fcbf039a47ffc78f0c68585a98e82a48a1bf8721b8d3b3be448b5584bda55f8e11d7d288122a917eee27c6f02af545167ae7da7d0222cdacf89637ea51b02e77ec775c6b74e61a60276af9ad34b4e0f9d1731dbe4e8ad83d8ffb6f6502da503fd74b4bc74c98c2d51e42ebb0ab5ffb348008ec34918a793b293b11aa80d8c4a7b5008407a6279df0798e11897a3e41d2d5ed5db3f5a8fb4d09015953bc9e0b3d45b5d5dcb9bb3963954a1ce5845cf3badd2320117e71dda7ca43001a3e4d37ee52c64818d92c4c23ec362f8016d60a2d7c307bded5d7665a86d0e3620368142c9d15bc0619fd0c619d41ed5c93d0b76dda2f31685257f2921f7afa2f536c1e4d48970fe87e23ccd0bbc029babc63448e90afdf735d50592dc683664329eed70dcda709230f9798e65be78c2a9d06879f477d197da27adc49a073f951a87ef9a8e28511a3a14a3f6180a9f3574ab212c2858660bca35bf2196e807ab45a179e3ff87f48728707ac001360a2524d331d6239f3cdb2c7c3dc5e3c24ea2bcecf4c2b804d51895aa10c6ec1481cf21576129ad2789cd2c4c9027a4482a14c0b59166fb38c2bdafbc6d4d43fc05b22a681ec6df694f299ff88b254e4886714a62d0d8fce3440722daf559f35ed050634773c8e4b67020cf45816ff3f48bb6dda096b180b6331c719ccdd657d8ae4411ceb6fca9e5972936d98fbb87ab939203e5a748c276d90d06c747aa65ceab3e618e67a73e3b7663b23d72c9419886fc1c35038e12dec0c6f6f35ee73e9350b3179519625b9ff5aedc143ddb148c7ee4ed25c974662749b67ea36ebbff67ccf2f41cb09d1680d0d77ccadcb5abde34cbac1dcbb0e818820a7bb6aebfe82c6db129d856040fe7fa100463bc5f18b68e55ff8acc12e390c7cdfdd5841cb850214152014e5c7125bcb53ac284e0504f8336ea344eeff122fe410b8de2a2ae43d30d500eb52e7e3d04b7a64d30363cfae255efcf6c1c4b9415c3f32c25dd197cf381374a1618e98ba69d1fca7ea7eda469785def91ff18fd06fa9339249908e50d236ac1cdc40056816266f141ae667d6dda1df2828b48074352c4ea6fc9003979fbd7c311452b0487e0e424a1c45ea5c04f1344fd5cd392ccf3f6770fa18cb48098698ce7db411a9cbe247d5907443cc980e998d7e333a760674ebcea47bf33624821e89ca717593dceebedcc80b3af0ac229c6018516877f68b9b997d861ae79e091e056b4cbe61fc7df81598b182e80a050175922de808a2b098de2120d8189282667f4c08ab52891e59baa2e13f7f54bc941abdc74c23ff6c9eec89ceaef7507e21b606738572eb876baaf798ab5ef28aec9f2a4b672b43d28111d416c4720173911a59fab886f424020f209af582fb07e2c0cce2dbe943c4730916acc7f739adfcf194f16a2ba23372360c8d122f9ddd8fc38c8fcd304311ec44e859a7c2f98323cc951e49730e35b401fbe1186bab45eb8ac1e287f0baacbe97ea5133ef62396970de20353b38c4987e70396187b6e39004e689174270e4ae243b0dff270db4fa08581c8cad09740de6871e342c5662dc9316f1df06634963388325f6edd7c40917d3fc09ceb31962c82d960f8aa9615a56e79938cad06bb3e68881e78d198356979a4c2d42f564f3758f6ae8c66665dffdc6ae7d47b974554579985e0eaf96879deb25d55a9bcc19694647b1fbb2115bdcc587fca61aa7f256a97a5f86718f104ce029ca082b890d47025f7ea9d1f920534893063465d17c44dba69d09971b1bc887df3ea73defecc10e1aa5fb65ddf1ebf0a6214e3b5b129c60f1cb42049ec8e2ab6f6019aaa7e5f0a8b808cd21f67ae4904e5fa6b240f712d293b1507e1fe74d185a9df0c2b654a816c498cb75413288626df1a5e46c56e20eff8a33bd63ff6c45ebf22d69e0f9c90ba2e4ddc9ecdc22bdd890c2d9571a09768ab6d4ead393f1e5c63a5d15a6947f7d6d81fadf0c14dee50c28d90e1a8a5de1f9df1810422fd80bf84203ad1841435bcc4e7f9cb310d4cad4c233b7e03398f083a00c4885eea96f3c415a3677511e51b4880a314bf69fef549dcbe5376596f0612e5005d017c62883e9f92412bc8b082b62698b7204a27ac8316db8c3682f68db78112b37796c5bf4e59053bf8c1f251a25f1c62b36d990d4033d13dcdc758fbc12f57a8694f75e76190cd6a7060a350b4fbdcdf13df32d129aa3ec2cb9b9066c2b0a40b210d4de49d554cab54f18acc815ac5761dfb330f444e0b535bf6a55ddbcd2787132c67acc9894d957a2636f212e28104d268cfb131c353f5624e222b265dd61ecb87141074c9ef78e5816eb8ff56119d65e55d46cb7f40ad33d7ed0b05ce434487df2ff1b47619da798fb97428095fba0461661223bb2e85c3c7c505bf45b3496bb68f15682cba7c4c6bab725aff76f2518059b4e42a5a399b0d44347a160ce3a63c99bf82350e54800922dffebd7b15f27fe5f604eba64d7f9450df0b87cede2099fefa70b27d2ac39f89950a1df760b353f1bd83c9f04a90506b78328d4884dc922fe652e9f092c4623bc41b8c407d562597e5b1d34b4c9feaf849492c14ddd3e1d1df81ac62df973bb198515fc0460055867e57e3b2547f92abe4ad2adc8732a67936e9c81d0a1f6cd85fad921af695d236d9b1bd4f0ebf402543b6432c6d92fd1fb5c2cc7dd2446cc9a2b8087d3dcd049c0a1aeffdfeea02ba99ce07380002377af715d79ab5f7c5343697bd22567d1df60f0c02ccdf489a7fa22753ef8fb0c8b015350a593e125471f3539bd4810b9794182185b23c2ce3d446df99acb0316feccd5ac574b38192e41c542816ce21949d6c4d2326b6fa5e18b0d17fb1ae13832f6a164fcd2a51a55115b70552ffdb7d474b1dbc20705442a7b3a5dea6465b4a47b5d33731756c757ba408d5a207eedb9779b3014d66ec33684eb91be951e9b8add68544146715406dae7fe1d345280b8e64f65d38a9629db96929641347dcd614d4d76d2fab1661f45e43c98d9fe4cba3b96abaf5ead17868a97f053a84360bc9986a8f27bf6f5290ea4f9322404cd5ce3950018f496de4d39c536c139e3b1af9396f578b42e064df4bf4838d560b4536cf35212af6bcad131ff3bf444582e4bacf98499847058f9c8294a868b1f87089e1e888ffbb7c348fa85129ba90182fb818e2110ea7bd9b9cc39ce13702958ea6a84c9b72b88b6e9df9ea977c9e9d518641e266fd9036b3c230ca2139c60f7995532544d580e226bb106b6a4ebeb66a82bf67d8387cebffb502b32cd107d6b50f3be02d60cc82a0a9e5ba05c94844889b29aeb155cd601f13570c3431ebc1dfbeb2c22b91840b661f79363eb003ef1705ff176377fc38ec32c38710d4c6abde83a89ed7b7b00b71da26eb9c4e6a3214b1f6a35b5dba4d0d3c7435cf7290b9dde17b6ba5cbb79a67abea06547106222eb54fe5c2e126751f8d24ec23a213f3c189411d11bc0ae59c597c66d11abffc747c1087522b4a5384fcb0a21eb5da17b9be7c8ce75857872ac342d5b1060baf18364cbe665b442845e747a0ce678794a439c2f8d00fe8aa78255acad4f1394a0085cc8fd7516a7dcfa535b70cfde9ac93509254af46463ab665e994a9b0fa8ecf9eda5d7e72e7d5641a0ebc3ffb4a565a82b4351a045550b03694ac6fdd0267b37259f164e0f25f76cd0e1dd0d3eaece1e4d84cd578501b88dfe4d6cdd2456ef149c5028f45f3396c8bc67e893e8b71265223ab47e3cc4ee0afe8a23d673010e39456dfc05d14257725e30c8da43d45c98e64f7e0c249fda55bf5902f216c4967a466cf701ce10808161bcbd9a99901b083abad1e6c43c43e88a698ff7b8efa189650be3cbcd26cd9faad45f4710f8b902de6db7d3cfcb2bc3e7bb5eca2fbd5d14228fba496b7ba280502e5f80152d17d41964e4dafb928fbd24aa3b46ca2928ddd992a7422f05d89b429ee483afc8e70cfcaedaace0e1780dfa8e4fb4280ce6752f8ebfce64bc5d748fa920d5bb96b08b187534d39ff2c551c6b2866c0037a0e6364c543b1c1e0fd83d375d36272911e6bbef5641d7c50fd60a7958a6f713c7323c74f4a75af03edb99a160083d1cf04446f19d8003819e48ce730bd47f4f603d5c9fbe3c4cfbc03f3530573353de5102f8484409cdfb4df5cdff8c5d5f8b5d0e33d264dae3269010c5829d20ae33c082a76925104285717814c5a7bed88b017afab1f150aa53ff7021fc77dc6175d7db1353865ecc8544700d639845ea3144d96c14239378a09ff30744b387d5cc9c75cbddec76c311f56020b6756fe237196cd37592f7424d8a620be7e45d850641bdefaaae67f088cb7061b0af90827610a91471d08f52193144181b7aac56a3a8cd3dfd034447d76992a1ebba8090ac1a1556fedbe81623513accd299ffe54b7a3d15c44c53c6c3a16484ea8671cbc7316daeb9656de8b3bf63327b493641c049d0588768580a06569d75e43d6fb02915dde91ed8ccfe5ac23e339172c079e4f88b81ad3f039158ff2989fc2e285ace1677a10e96532fc4671dd7ab0cca0b2daaab930029e9dc9bb38e5d315fc2779e475dd2cf5d8543d94d2edffd589075"}, @padn={0x1, 0x2, [0x0, 0x0]}, @ra, @calipso={0x7, 0x10, {0x7ff, 0x2, 0x8, 0x2, [0x84]}}]}}}, @dstopts={{0x20, 0x29, 0x37, {0x87, 0x0, [], [@ra]}}}, @rthdr_2292={{0x78, 0x29, 0x39, {0x2b, 0xc, 0x2, 0x3, 0x0, [@loopback, @mcast2, @local, @loopback, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @ipv4={[], [], @broadcast}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty, r11}}}], 0x1188}}, {{&(0x7f0000004900)={0xa, 0x4e21, 0x3, @remote, 0xa59}, 0x1c, &(0x7f0000004980)=[{&(0x7f0000004a40)="8133793bd9d77ba6e076e4071863280e2954cfbd067b599f5fe403696d363ab3d42d1b8966454e61c1b9f1813071432835795f1755cd15677ae64695baf80661b52e531ef277bfc4ab89f1bafe72f719cb2fd7d5e95c22a0303c61e73355516cb4d167f84f6e193f9b72972f5103ded260e71f87a784da1a774d30be3a9dde67e38e4e70506006e2211ca2ebd1d8dfd6284dc274eb7c29d5d7932e527825c92f72a7668d1a2553ee", 0xa8}, {&(0x7f0000004cc0)="2c329d677755fcfe8dc5046dc263bae1ea2ae5fd0dedee4c08d3213ff9bca71bc39d299a01783b0418f505aa32f5571142773f122402a4fa4f314200d32e35dadd07e1f1cd15e6023a5fbd40f972e45db3febb76062984a7496f0b81b449787035704e07c71454a80c321b250508ec5dc8659e6a6acb18fe7d25f704240fc094b3faf0ad4a5ce99fec18b85e80a5d9d56c2e8615ebf67376625b9ca47ef91cd10116", 0xa2}, {&(0x7f0000004940)="760c2c2f06099b11fe775c8ab9e4bd7257e1f32328b020c405b427e859fe1d82", 0x20}], 0x3, &(0x7f0000005200)=[@hopopts_2292={{0x40, 0x29, 0x36, {0x87, 0x4, [], [@calipso={0x7, 0x10, {0x6, 0x2, 0x1, 0x8, [0x1]}}, @hao={0xc9, 0x10, @empty}]}}}, @hopopts_2292={{0x28, 0x29, 0x36, {0x2, 0x1, [], [@ra, @jumbo={0xc2, 0x4, 0x20}, @ra={0x5, 0x2, 0x3}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x81}}, @tclass={{0x14, 0x29, 0x43, 0x1}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x33, 0x6, 0x1, 0x39, 0x0, [@empty, @dev={0xfe, 0x80, [], 0x14}, @empty]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x7}}], 0xf8}}, {{&(0x7f0000004b00)={0xa, 0x4e23, 0x2, @local, 0x5}, 0x1c, &(0x7f0000005400)=[{&(0x7f0000005780)="2d55afc2424cb552a7d266f876cf0a18b92128bbf83ed1238191103558bfee937e4b27bde90b478604f74f140b6657c144704b471b3bf8036365a05b1bd4883c65b2c5fa1294ea75f9b4b62c9a54828c73832d273873b5e48d72363b99a550bb15983aceb6536cbed11b86fc38ba1d3cd0c4f22654f047050781af7c87e27f75eee1f2e6c6269ffa9e824f7fa9091e941e93b1f1b0f5ebf111b498e392944f1d53a9bcfaa102cfc455f41a0617ff81eb66344d7c2299eb9f9ffc126653120fad87a3648806387fe45f9a1d04656049c2b2cc3fa7b10e0c056bfa8a852da320c2b3d510", 0xe3}, {&(0x7f0000004e40)="6fa4ac51bc176e818026dd8b0a66d4b9300e0a93f91baaca87764d33e83cd9e7a2d5b070df759a5e431409f684216aa8d9d078fac17fbd18fb3db621987db8f6cb97", 0x42}, {&(0x7f0000004d80)}, {&(0x7f0000005040)="aa18787c5814ac35141ba744f00cbb272af4eadf72c4822054ed090d9896b22d17ff7b78d7c89f0ce31cb7fa87e4617531896d6550420d3bae", 0x39}, {&(0x7f0000005880)="6ca81ff6594f778b9e64525d9ddcc953cfd075a8ef8d8ad88c077afcfc79202c87b868e5abe413584cbdffc5a4c5f1a3a75e403dbc1885ccdd0edb4fe204a970343ebc68007da46895b26e18642b60f9731322e80097360b55c3884fc8f2a83b0d11deaf9cc8914416bb6afa5ca8957f5f23b98c48a2c1d04e190a3cda713d8cd32d531a84865577fdb3e367ca4f56388374039fefae12a5804f3381e06d5dc55d1a7059de33c00a0b4ae5d4ea1a528599ded72abbbde7fcd62b3520a5bb1a63b5ce702dc7f27a8033bb66b51e4238c810a535dd7a57bbfcc1c2d56bdfa132a2d118a8609c7e07fe6b97f36d549af8a714c8874e1044552a3b1914555f8bef1df2fdb36b8deaaa95204980df5f2fa5b204c4680e89d89a9e49887099e3a1d41867db36cd6a34fed620a743730060dec187a38cf0211197d9535e52ea3a9e79a7cf41b2c2c9309bb2f3168290347076e0abcee40d241616df364b05dad63646e7f5abce4024d15c2931a9b4cf55cf7458b795f35d248baa832bdce209f4fb2ae4fe082dd721673672c1ff0ef62dec26d66f66c1a238d83012719fb5b22b2044703e9a73858a55e35f21a2e81f20806a702cb02c7f0665d72593128365b949b5708afe3f20ec6d8926a48739412510b6a4e9e37290f07ac88bab2cfed55acb94f4df7e26b50457e2c563967b067ae9352bbe7ce330d6e9b2f03a447e9642050bd81daf26ca62193bd94ca5c2ee25d885b19daf16afa9430b4313d9404c76871ff926f4fe13260254f3b3f6bd84b48be5c425230261c15414709ba3c79760096d76583ad0a3f09c8a6ea1f26b3606f198008c30b6e44b3795ecf5005230a4d63ee389cbc43e5c9ba2b44489a8a2b7a08916b76b53beceafa9e830aba6b14876fbfb101f7a9f4238e3f6412aa287cee59ed1433e46e9efa63314809d4ef1fad65d5b142ccfc220dd40c5c4dfb71add8c19b7846183731dc0603823a9f2b111c9bb78810a5fc94897aaede1fe0cdf0d4ec91493438b87c3ad3dd83fafc314b3629d8ad23cfef71646f2c63e8e94c825b0031869e31e166316fd631596175c74d7af92452ed5c16497f4bd3a201869b1948ba4b6f4d9e2884a16120581c668a93f3c3b7f0ddddda223c43ffe798e5e8faf4f2f9e5cd1786ae2fe16b588629d26e72db7ddcd839fdfc9537f078e101c3259b1823edf88e1e845c7c588b647cbc1f50f8afe409c44cef6cdb63676e0b1604a8942a8f2d94e16f739ec3cb5238c438bb9f0f1ee38bef2cc85c990741ea6112738839f9c109cb0d91136559314dc26488d6d13f600101a8b59262b022d836171b70829f839f3d936bc7710c9ba8d5023730f6252a2a8447aea91e2d77947808521720e75678454f21ad6cac40800db3832c71cc01baceef920ffd74ea5f001d9380df093df36cf47586365f441c0e9692142b2dd69a96b46751e05feb637dcde48db4371aedb273bbd88d0be86d2b3670415a3f615c64f1170bb993fc2ec795fe4251ff19dcd586baf706bfc4fe82a23a32eaec511d5d04da762ac318edc865b12eb33c0fd5a8992b98ec3862552223d31ce3165aaebfb241f136b4ba46da347a6ad3a14ef4588da39e08f76c256387f43b037a60500506aeaece2fa39d7182950de13f44ff912063c206c580b7fb07f9d90bd6f4000393b48b329c0ca1bcebe491a9ecada4c47af784f267d32d25a9f5440d4ee36968f7bea0100b96b722eda3a2b7ab6107057ee631a3d8889c2be7c8131928814a9bc37e95b016c4bd6e67909760663aa0b53210ea19c2640a0c75e354d3ac056ff140f0c1c431c0e1f4c0220a6a43650876acc7f99c8f8afc7019857c9e5a33bf672d2299e86dc9d93207c7b98582e7dd8748deab06a5d54754e16e9b6611de8b4134a31edff00c574992e3b0d12ccdb75eccdb0bdf8c38d02b436ee581a088262f27e4ff4afdcefd7e7ade2e8c20a4732361136249531b34eacdf8326ba18f292694c19385a1ed4510588afe20c091f6fe24f80a07545975fbf46e02eab97942fc3668543af7c743dd86101dc70465129460000d06a718b8b11dd49475a3b0ea9431466aec5072e931ce3e2fc33ad3c4d8dc96727b62346affde7cb2b19b274033cddb7f38f5c2f9be9f60020cea225c583ce6e3eef1649711f74e71d6c0673c496ad4739a4caa9a1117f675f4674b42f35d1871de5fdaa5f42c01283f946de9501545e6171413f304c220a653f4c278fe98da8f4628edd78cc5343985974db6cd2948dc2fe0f4d554f8724da4a4054b7fb6cae96e240c0aeddbb70eeea7b7646bc62ecb6bbaffb6ae1fc1131cac9e3aa9daf0620b235aea23eebc286ded8d19744a6cdd064571d2cae9104a21758e64bfd18bc8535a906ff75a9b65ea71edfefbd8ab12cd103221ebbd13213efa9f11dc17cf549cad5cf977b0a2f32421b324c4e65146c1b0ede2fd3b78b845c4a8096837cf5f525885d67125f9419a338ae8db778b54a22effb5fd84ec5df2068ac870a78fe244b9adbdf1a8786be900fa25e00cb8298feb9311730688e86e74753ba740ffc6eb6d69c034166c03b4d7d0a43ab20d288d7516fd8397dec8c3a09b63684646f9beafa03fdaccd549cee54f6e4c7d2e8aa61ae65c3f2d5ca49fb037f2e8de1362ae83eb015b484d55f9ba14068c70888f1b3f05f0db1fe6115253b02e0133bfbb4ae6a76fc0238c6f7d505bf567cc74e8dfc50c9cf1fba841bb45bb045252e56372db8cd6c43984866c0000dfa952e06bb85fa1ea02db1b6c92b8293cbbd6d47aaf05f05d654a92a4c1b710be39b1171a426b9acb6445df2f23d8a4d685e848aaa9ecf5d8b0e56dd459c4edceae39db54f13fada63efc241a123c2a791dd38182b90b94fbaa5b97c7076b4986fee90bcada0c0d8b4411b64f705e138e85f019cec0a8a4542f57aafe9c1f6f096cfdabec276e56ab8e72362f3e98aca980c134888ab1e016dbf04a8053faf0df3133b58fef71995edf4aded223e131a7ab33610d8c0aa208438daf336506fc816dbd51adaf492e0c1941be31bd34fd1753a4e266eee5e4fa2cec3825a5b03d10334719c6cf5ee9bc21f0d9d0644fd95a9e325bcb11cd9c995226253dd8f90c883dab2f155477b0d1cf4687293a714b7096644c5e8fc46a9fc5b9da0a144a1c9502da9230259ebcae6d366dbf516ff1ba993a23124d9d45ceaa206e4d0ca0e22910f2b54ee01bcfb0b1d13f9f59e8299da029f22eaf91af9500ca620e9c002b2641b8f65ea2eb2d80b8cd7cc6b1a68d159ece3da8782705753be704da612372d864e736eb8fbe9b918fa80fe0c33418d7413c5d0e34bd34c7c187c3d062b97188110c25e6a78a77dd9bb85e4c96eeb36176c1160a398d3f9af747a6b7e31e1711a4536ce0f92f1c251ecc660da7ea4293c25d844d1b19096212754573198de927c950cd6fdbf5e36891fba50bc64123a5568a30d8766f9ec489073a98c5a3be15c7bcccf1d5f819dbc6bedac4fe10ebe566410dcd994f790c2a1c9c70e34e77d7f11ee3579d95b535afabdb3c5dc4781dc8b285dd26dd0e8cd1f9a5eb0fad6559871e12f2e74a3a47ba52621982c7b5447c0666282a6cf293fa3657ab9f5ab7d2f08095ba8e418bb2602c36f4b6b54cd70d2633a554934882db4b724e8dd264c6d6b5e8700402f269bb1b1638b315fa08b0bd81d0c875874c86fd8c69b5a102b7111c815e4dd26373b3e5a1e60c9d328f5ba29edee24c862239337f65a7d065b24a828bf006471873acad872705f6acad01ce123d99ad833b7cb9caf21d16f3bf917e39bbab61b497e458a4840bb62769f90dd95821cc0cbf68ec8c0906b71054e91c0a105a0fce6e0f57e96e89f74b595928ca58fc88006d5965e23fdbea9249a2b7febd16c74b825dd84e59a5d055db7cd385c24d729fe221e7d170fc9ad4ab64e289553c1089207dabca0a2ad907f39be2d924b073d39c7def803b129f4ff2ffab1bbaafdb4ec1ea716f822cdadb4e373cef257ee8e1416c4a265b3ec35a4fb19f6659341141a5c948fac3be8f9cfdf0f9d8261d49d1ac8a295812e9953f1b0b760c71fc9836492dc68cd641df4ea2e1134b20efed67643e25f43de637b3844851f131ba0fdd3eefb5fa310c34f60480782b04271bcc546aa187f84a88cf018448a991fc253f12d37caa8e3635fe34ebee7c6e68e029761fb839073d8d3e48762ee480d2a999a867c72912e7ca2897160f1643ad899ac5b5b60fcc8ca118ffacb619b37808ad2f39cf639a2a2e7e54a7370509c610396e07a34b57d78f082f2c3a4351c820eb21ddc6f3a7c210303b35a5caffc4dad50227b8448fadd8fecfa058d4bf2cda5f9a4b48b47e4bfe74b6340d68b4fa18e768de76f242c0a4a2cc6d1a947cbb342e90fd4776841fb6e122f2477c8d36329e13af6f240a7113d9140c13fcbf6047819bfeec42eaea9ee9ab21619e26eeff2c207f75722c3109b24f3386cdc9726bafc780751aaae3231ec0aa7bf745d50292a88a6204880360fbccca68f82f071975876f70ea3b0e44818fcf162972178371c6006fe6503f48fd0f516d3cba40dc53ed6bb19e4594701c99eb04fdc6dd68cbd2dbe72cd0f35d7c7329a1ff2c9ab60d37633cdd15b3294e2abdcef3a3610b4429d904c180b11dde1fc2d0e2b06b7aa81dc6ac27571e0ef9013d0592652dd4d0541e69cffa6ed27529474fb6150f8338e45a1126ce86e92247f86aa1d1473d47a9003d789058de48277e32ba7f8c45ab35412cd0a81326702fafe2ecd1ff4b164078ceb8631ef46246058b9ca89dbf631bcf69694ed3790774f6e548bd2343d3ff8b7f27557a3a81d9464d1c3df22db106a1df079ef70c47e98c22ac4cb253bd1c01b6c0597e4d72c05000d53b6716b85be18525b307906efcc6928f0578e8b60fa0c793c3d03d6f9cf5cb98261a4dcc9f8c9d36283f8debee129c9e2ca7a83092135fef847d57f454ebdc46b7d6aaa7bb88d6282905e9620cfb44a62638570a77e8eb25279e823ad2736760efc8901e27a6738307b6af52b9fe4f4f5b9094f0c7c5ffb364d44c577f201196650eb77d481b377cb7b487799b285d8363ae9a48ee9a69dda37f9fd8df0e122e29e9f45c817873c7a2bed732ef5e733c709fb5a3a2e88c84b8372b55ac69e344a4f2da6ce4176c667a835f2f97ebd07b517372c19ad403f90727d248a7cddba4659772ee2f483fed6353fee0c5d6bef21656d9968f8da421d833a9d8b4f4109f6770e0e4aa53783ae0005f606507dc9e0b7e053a57bb058f96c6e0b47b10b341ff5d0a74b4ebf3b28e62b9e890fe93e27715467e3c150eb97721e1cd2f64d0560098476fc1172e0ad2b78c18aed0d3221bba6943221d8d5e3b9a01b62c65e373bd4fadde79f8d326337c2001f9f89ce978634a661e878cc3c240b3aea4273af98037f4826c79644557d4e0e632741de863ddda9a593f38087015210a934d177a1e29bbd1bc2b777f80dcbdca969e01b58f252e1e358639f478b08ce705c0412397fb47c36a4f0fe392b7202c82b1fc586279d32e7b4de756c55cf87876d7a1e57ae4bc572babfad28ff05a2a41127faceb92df2bee5cc0c036419c265ef8813e7e5bf21ed7bc6e4c350eb3d978a7d0e29ea287316d790beb59e4629575e0a4853bcad110f9c12454631fce55bb50597075433109f02413493cb8f4933ede0ad1d4a4d64d201b1c9db08379cb4942111d186445537187d78779102a5c78bfa60e993262c534b7334065cbf8fe8ccef4f8eca605bd8f418c96f67", 0x1000}, {&(0x7f0000006880)="7b580c2f3c62fd9f2bbcdb503402c91b130b567a138788695cc68e8b2afd945c21ebad5bf0e7586133f67610e69872df5e7f34da2653423caa7509f1e0317903e0e0ee18e2f3355b4b90931bb180336e5450facc43cec0f996a0274b7ef0e9f4ca448616729f72b39b2ca9f1b5cd69390c46b0594152daaf19579ae422fd9292853309986dfff50946214638f0d847b74d23501de240f94f764311673605450336bfc85e5691f7b48c9df866ea9140a81466bf608be9c7be4fdba3b8c3558762386f4bf07f82160423001769d2ba9ca7", 0xd0}], 0x6, &(0x7f0000006980)=[@rthdr_2292={{0x58, 0x29, 0x39, {0x62, 0x8, 0x4, 0x81, 0x0, [@ipv4={[], [], @remote}, @dev={0xfe, 0x80, [], 0xe}, @mcast1, @mcast1]}}}, @hopopts={{0xf0, 0x29, 0x36, {0x5e, 0x1a, [], [@generic={0x7f, 0x80, "7d84a446beef17544d6e51d4bf69196c5ffe898399dc3c73b904ec87816a540d6802851a793a09d92fb001fb393e95bb08d5043ae1cadcd840b3e150188daf77744c89551ed318cdb727ec6b76e104e9fd4b8bf5888fdaf5a59a8c541136a8cbc3f31b4505a71cb3ab43c5779d0b84e793f4ff6e9c669050a7affea7fc72a18c"}, @ra={0x5, 0x2, 0x5}, @calipso={0x7, 0x48, {0x10000, 0x10, 0x1, 0x4, [0x2, 0x0, 0xfffffffffffff360, 0xfffffffffffffffb, 0x1, 0x100000001, 0x5, 0xad55]}}, @pad1]}}}], 0x148}}, {{&(0x7f0000006b00)={0xa, 0x4e21, 0xf7, @local, 0x4}, 0x1c, &(0x7f0000008080)=[{&(0x7f0000006b40)="4d6904c701b153aa658b2d50cabfa6de68008ca898c5daf668ba49ea9e9d5ac3bc458b0863796e11adebcbc20c3fe43883ab68d7cacae876486fb9f25c", 0x3d}, {&(0x7f0000006b80)="69e17bebf2", 0x5}, {&(0x7f0000006bc0)}, {&(0x7f0000006c00)="b405bbaab3127ccb3da18f2ed865ec6e0f36ef40eac7288d24856831dc2efa934c3f4e6fb2cc7199dfb4d74a2880daae6801baf0087f81377efc84d4f5514f1d661fa22ee976fde304bbab4b7d78fb1d2c9943b6a5", 0x55}, {&(0x7f0000006c80)="5f0ee6373c1811708231d9290187dc61b96fef21aa2ddf00021b52742d9df4b62ca09e92580d3e67c0fb2ec42d98b6a811b88e6d3c14d83cf3c01b9eac24f3d3", 0x40}, {&(0x7f0000006cc0)="85ff75d918e126a04ff87ecc92cbab04137b881d1668f554ca4c6daf80cfa828ccfb467435f83e247f56730c31631d93a808370384933b5bff4ef2cec0ec33828c9946445e01aef324bcfb2c917b87e68f7235ad033595c6db8cd761ad7b62ad8046238b3e07080248f6fc07f804cb86324f303744ce318dc5a0f86658e206885bd6db08590f849ef681dec838d382f713db735e3a43e745e4396d86f11763581d0817982efcd6528fb07298ed977d86086ed28ec3d66b0c29b053ca0b4b0640", 0xc0}, {&(0x7f0000006d80)="82d54ddd9b3ef0e36bd7483412201806f4e9b1351329418f3654d506f8443f7d46acb82907beea0ea2ddb4782c931be8e8330c5a8782d56340816c04d4d373e3308ce83786933cb7a8db6680ff2e2166052ac09124474b6b1f598eb7f9e762e96e87e8a8b49d6d09cd0c50a1079f6a3bbbf172d376f2f0796f52215ea60c549b390ed3c9ad73ad71258d2e9883de0e18434801be14edbc452e6a9799f9288b4265b27fb82ae667bc8826954d0f7db16ab4935c405b409560", 0xb8}, {&(0x7f0000006e40)="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", 0xfa}, {&(0x7f0000006f40)="3c58cebe1a0ac426a0add180bfb2b4a29264ec8d5e26", 0x16}, {&(0x7f0000006f80)="f1c26a8d265ffc61714273347bc407ef26a1ebd09b5ddf58e45781db643d6ec975b60d5e5854c99350c1686292f2f1b5d8938dc9d754ff8af24f666e2178dbc9f5745657b5b8a286010e34360bf4330a3616a9349f64cd51441254c44162ad4dde296ee4de337da33f7960ca58385d4929840002ca82d659dd9e6040bbf4742ddcb960d83ac4c3de924b7edc140ace444e3bc269de0fd531403dfc6dcf413c1d88bd6ec3fbb5067ca2e0c0c117215beda29aaaf907f0dd3f7473da824f4894ddafd574236c07cb288e86df8340c752b9c0645582a411417cac318c1e3fea5911f1b592e959788be266b20f830f5d1e2f41765b71f08121228cf9d65d84457f1713804872b02b23f4b3c3939ab3c1a2ab33ba70de3b988489900ac6524293074ff0e5b5d88de08c4aef7e50a967a6a321482ee1f4c514ddf0289ed0e614fda6851218efcd5f3756cd84a96d9806fdd663d8834cc285563db177a9f0b3f99d1a2602e3f50be766cd9eed91045d8407a2ce9561f6ec4cc308db5f21c52f30d009e8d4aa6558fa5c705a391870a8e5401bb7f66fcf201367e3cb8a6d809706c532614f8b5a476ff880658ef1a2ecbde2db7d46876234baaedd1c844f30e187324e0a9b15b4ba367336fe19adc0fc68b94ee3315e5fe51c404d0f65a5d631d0b0c8b0dfeb5380ebfd094966f9e8c76673c1e16d8b6fb8b9814465abe38bb39950478fd27c933dac52411cd07b2d370a2ee8fb03b417ecfd574da5fe639076bbe099d07a2222c977dcdd351680284aa52ac42bbd92f3c24417b8875f8b2bc55a0f0071c81cb15949dc5135bfe7b8daaa3a9e545693d8a18101c9baba11079301a35dc7254310732181b8aff4ebde6b77008c41c8edb49068c7bfb2f56e6c689af3d11785a3bf4e401656599cc78458212186e27b62743cadfae662a9a0869221c00a112c4cc784d9b6eee4d9bfa38b8b3acf6877f9bff9ac3d4ac578e2b5e44e6a30b9a6b56c406837521d95e419891ae47b778e9b177f3c0dcc149d7aee7bf1dce72b9d913799aadf1ee05ae382ea3c9ff417eca2553290c12e49866366b809a290499edc4f6b6ebffee7466ca5a2d5f43eea297c769b2d8a92b68faafe7c7f9f0b98d077d784f4c87fdb2bdee6d03e0e9a5935cfa4c6dbb9588a67a29e6834fe3cb5e1507c4d3ad0fa1e396f0e3b23793f41e7248ea1da6bfedd2e95443d202a51b1d49f0589cda5f57d7d4dacbb55a44e908296214c0ca60a48b9bb3d21fe7f4f7d267ec64271f511af314618d30f3e141a45669785631e077ff86cad9956c8a699fb6a2fd37403c86b0b17388d8ff723e394780e4cdb1668658ec9729c29a660d14c6d04a76079db37567c3f3aebf139c51a9ca1b9047013b13f5a134a5a24cd4f22f4f312dbac67052d0e22d3bc0c94dd9b6cb14a018daaa94dda7a89b06e0044a246eac52a1026bd3b294f249ae41fd7d10111091a4bdc8236764d2cd523fed9ffde36ad0e6489ac634fa66636ce823cf7305df4c441d8e581020fb68007be7a45885090c4e402be834f6904dbf5e0a941500935cf7f36a502c423a78c6a0812be7b613bf41b87cf595bcc4f6b09255566ec8b03e01a4af4e00ec3679bee74c9b3a45f9928eadc21c8e105e34cc2ab0d101a410b592a7c713a5d0b73e30fafdd36f6bfe161b453c666b04758d3f41cfd2cd40cb1d53ebd827d13ab3931edbf4926a5eb30ce93c65c516c35ea9cb5e729bf00fe6d6e1f2cd1a5c3e5da2dbc08bf68daebe2cf5bc9b079c3b3346ce10648b19631a00cc20e11a5b3a04493c61ec02a62f18a01ef728469f06606c37fd7783e6240960274d59f9ff00d9d8fcb9ec68c3d4279416c69716650006811509b8d74175d72badb78262652ca98421dfa20cd2ec907d4e22232c803ed4b55751eab1c9bbae051f32e8921ea0773a76c3f7f8690bc77f4cd667c11a767f89cca54328e35168ec587d1167957d84cee77a2f6cd3e707fcb5ff676d2c7de02763548a998576b3a52807443c367493ae288788c5d8c687cdc5348b6e049982eec23519701c598994c6092825babee688325a6f19c325dd957cabb3bcf29ce00de807d41df48f1f8d6d8dc80178e8e3369ec330ea786426f637fce5d17be97f41842d64e25005f4f00d7dac11d275c09fd127a02b3e16aa6a3d42d1a28de41303bb7aab23838afcda16955004edb8c8fac245123e54309a010ddab2c1cdf2af98ec891b9632ef646ea541ea8cc7a9a5b8cde9fbd816829391e21e1a534492587a5d7fb958c7f79ca957e8c6f0d438d9db956bac1f10660e5f078b069b3710ea258c74310809799d6c3d04f9df35fd33c1c9ba45410c5e225f24e33356620bd0e1b71b499262a3235c1a3447878e17d5f0935af8e32e8e82f1f553ff7932d6c2530c232badd67c137fc12f94a7b03f12499f4360f1262008db5d32fecde28fa5a71a97b0cde28353df4a1bf9b4992906aef524930e63fe119e2b2f9a5611d72daf615fa4428e9919c9ae0f109ba22327b04c71f0d44e5e1c004539d4172648030fd1910a7d6bf923fe46156aa2ed318731dfb00d05724687d6167c6a66d83c62945944d1123e4b077c03cae51ef01b958b69787fa944f10c6a2b304986c7faf063c93275154b30835fc2d338759d58db94ec39725f87e0a7aba0703f55f744a501c91cef823319c625ac618505ac10e9d6ef68dd04dc210da422c42b6edf4c7e58db728186b6d379c006b75598731b8002c159182c7f0320618e3d60d7c652dd3d527e0cb2aedc83a234edf61e29aa013916f41b84a99deb605628f0bf2e3fc8eefee26c44429f0c61487eaa843b675e9d113a0484a4fa8009deb179162289407a038fce188517a349a56f6bd0dab5754636fa158d090656ef0e296d15253511e9e555e20d2dd7f2d2096d6f9ed60cc0356a40badd93399e90aa09d25d3fdd4f6f39a3de019491c3f553de7de35fcb7301679a2f597665414f78f9ac61086f6d29b8ce5adfbf39e109d7c7521bfc888ac19b795da32be59ac0a2a485b659b05c970f875cf5ea74babe40f0852d1eb04f7746eb4b33b2cd2ac4006f2342f85bb9d66ffb0f1fe4309fa2f61d40f30884f54c32d75aa8095a756bee111aaa3acb85dd727ab1e0140bbc785a452e4510902e7298fe8d1d18ad2b9b3d3b793d2f03df8dad580c150e46fa1875500836ac62018299342378a274fe31447bc51c901c5905a85acc7737c8469a4e2639073e0889e3c4fc72fca71819a89da4e89eb79d0881695297ebf92c86181e92d12d54478ea12d5657183d36a35015083b521e7bb3eadd1b0e9d50f718e8bc93be6b86467c3493dcb2320fb63fef24fe349fba7d6ae4510bdcbde2903eef4e89855e84201fb9aba9a2a93dcb4a2643abee8863ff986c52a5e6b9ac5fe3d0e60d5772f7d0e22c471c9cdf4c724ac13aab576d59715498bc27fd898eca492e9ef58e236e8dd7135eefa44410f09abae33f9408fdf8f8be7eb7ec95e89cba384f1686a7f306607206e4ca39c0bbb75cf889ab2589c591f78f8870b036eed2d80cb231254e18eabef68a5cd8460beb2cdc90bee7732abadd052acaea5c2c34f4e8aa144828101f1a6ec0874b7a5839c4d7af0dff5a1b45dc51c1bf11c93aba4e8683c30248b8d62f8574e74179e48cdc410f420f5d1d268d8399aaa9b73997ebcecf9c66c96d18c514d19fa387d100e7aa35b9e0f4d6b07fc461f54759a2ffe55e80df0f553fb3a1ee6688d5b4397f3d08bbaeba93960a050f9db6d07120ad5393b33ab4953434f2ad1d7389f34af08ddab86a974037402bd0152e21611067aeafb88ea728dc72bc32eb7163eec009c2284b568682dba79fe1b9bf538df1fa7282455b909178ca9427cc5b187b736d5cecd4dce0684fad7ff963eaa4ae7b79f84d7da6b9e5d93ce8d2cacc238d51b2d33730052970f7ff4aba05aa4118d5bee13a2d93c76c6866fda45fd2d434c1982315f3444f13bdfd918510b09b5736d0840a05f41e9f888deecadeeed7bef4c5e77a0fb0f206184683778199e58863fcf22c4945fe616eafbfc1b7024d1ea57aec6793dc2c731272c12fe148d77bde7b4f0de33ce7f97eba857c375e9c5f634b9d8a372f86ac5db12cf4765281f23a519ddfe9d8f3021237375b66a5e4071480c25bcf055930491f121dabbad4710c33bd119923f0edbc7bd3f892572dd7a10f8cacd448492493c0d3b80f9954041daf484bbda9eab6a28553498452fd2ed8284e1e60ddcf9029e51d3a1e8607686f54436a3447c4b15a6be49c86333716e94ca4a3a4eb003b3a61f900d0544aedc68041d8b55373b7581b5e3a5e59bb31b380a220de2681c06526d5a590f5bb70ef09e7399cab3755742ff4865f4a71570e83d91db52b8de431700d673b9f15b691ccd2a9bb250f1af0d74d0dc469dfe16380d992eb30b9191c3ba4ea8c916e6953aa53867bdc044c922cd181a72cc33fa59352fe1be287034f5b0c472b5917c719a1d2215d39684f728d4691dbb7cc668f1692ad11e9361028afcad0f6006d2daf004f81f835cec6491e23f3bd5f42b571e3dde2db8a18c79e3c4035edd9a0d0d7865e1d7bd39d88e835af3a40e54d9d835ab803fa683d80c0a794e10064d42dcc2bcbf1592562f3d52c823abd98795268ed3efbc4cb880c01763c09bab7a4478e97ec5d225c13ecbde694d48244330ae798a89d3f4be65f6ee7fd07f9a1d7bd3c2602f77c6ec80a8af95ea200a9612ede4be6bc068d0376f2e429687103e8fcc106d156b46f0157111a52d8236f1c777974f402aee496070a3b8142b81572b5a054caf726b2ad117009e004bd60c62ff176b056cacaefc23a33b1e2324283fa0039ad58e22a721f813e15eb2603181c9cf12bd1d24f4f7095f5f4c83bb14030637132ebe3004a94cfe86171e3431f02988b67e36e14b8d1390a4e153c84db1120c0f1b11fb383978213a887948a39042c6510953d027ffb3a053a259cc2e787ef112aa1dcfd7a5fc80802fb86e47bf8ae9e879af6a255bc02e73a3de582097586160ed81fb5a94487d57ede60e89f45471b34b0a57b70b7ad81aea46dd64850aa3fe4563719f288e4b221815ae6c0afd57a4473c53bfee1efa8336d280801d08321a61b03db3e6de2e780afaba82ad23965aa7631c49a4bc90a2b232c7e4ce2f7bb4db956229bee226875ef9c634736365275992da873023855af70fa68e1b539d8b05cf1f21063e23eba112cb399828de9475284700ea38f9ea5517a4bc9a9d96faae6f6e16a3047d303c9221ba2b3c14d142e1c9c2966d064c2fe0341bc72bcfc11e3bf62615b0e1a9bf5420fb480b473bf0d93a6c6c2e29e6ad3d0bc4142b5fe866dce9541f27870a715ed6939669e81be3c8b131d92ff82d9090be4121af8fe107fc0c5789eda36daf79d38378b6953f8da62388d4780c81b5ca801b966dba528b09432f458fd4ccbff89bb73cbab6233dece749ac330799321e62f049cdba16b9d99382fc41e61e2e105a15a7abdc21d6ae68be73fd42ee13b674fefa97a25c2dcd255a158325deead776f79347ba0587cf53c720ad61f606f917410736c4949f1f7e5a30e0b8707b01a6b97bff12094b6da057913581b973b1515b06a995f300bc195c72fcde276d8b096b3331edd6249cb9cf8747bd925bbdea4c153088c443ad0b9ada960b079705ed971bde96d42dcaeaf249b8ecffcce37c5f9c4ba51dca13815b64801087990e6e8c8ee43e1c068bd1e15e7e87d48d2c72da99ce7d16d914cd5b7dd7b60f4bc5c2af", 0x1000}], 0xa, &(0x7f0000008140)=[@rthdr_2292={{0x98, 0x29, 0x39, {0xff, 0x10, 0x0, 0x1, 0x0, [@dev={0xfe, 0x80, [], 0x14}, @mcast1, @empty, @mcast2, @ipv4={[], [], @multicast2}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x28}}, @mcast2]}}}, @dstopts={{0x48, 0x29, 0x37, {0x0, 0x5, [], [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x9e}, @calipso={0x7, 0x10, {0x4, 0x2, 0xfa, 0x1, [0x3]}}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}}}, @hopopts={{0x28, 0x29, 0x36, {0x32, 0x1, [], [@jumbo={0xc2, 0x4, 0x40}, @generic={0x8}, @pad1]}}}], 0x108}}], 0x8, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}], 0x60}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000000)) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x4, 0x212, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="28000000b79d65e900000000000000008ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f00000010000000000000000000000007000000"], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000000)=""/80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:14 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0xfffffffffffffec5, 0x1) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="140000000000000029000000340000000800000000000000"], 0x18}}], 0x1, 0x0) ioctl$TIOCGICOUNT(r2, 0x545d, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x1c, r2, 0x300, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x306}, 0x1, 0x0, 0x0, 0x80}, 0x2080) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYRES16=r2, @ANYRESHEX=r1, @ANYRESDEC=r2, @ANYRES64, @ANYBLOB, @ANYRESDEC=r2, @ANYPTR=&(0x7f0000000540)=ANY=[@ANYPTR=&(0x7f0000000500)=ANY=[@ANYRES32=r2], @ANYBLOB="a653e30d2dba2c82589ca8486af3fe5f9455145e4ad24f38b808cfe6b71f3c8989a78e828c44121fb9ac3776b4e704e3bbdb713b0ad3dd1086529acad16674d33a35c492393d3a14ae326530230b5362376ad3299d3b10098b403a8664a1e0f410c52333ee96189be1fff4ab10744d73734f19d02c9d20c49e02ae658a6b1c665987ea2645832c3998bc4c4ccf13ab265c5e52b3bf6c3d9747ae7d512302452e8545fa4a9b78404acb72856e664f279fcd433bfffeaa827959c2108d7e1b2b55703d5208aea66af9711aee59669a3dc6c3d4f7fcb9c41cc631c4fcf7fdd97cb472d3dfa292c507b9"]], 0x4c) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r2, 0x800, 0x70bd2c, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="28000000000000000000003668dc7e21e091329c7000000000008ce7a5de69775f3960daa710fe50a6b89a0a6cd79ac0f7c59185aeebdf5f"], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:14 executing program 1: r0 = open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x7fff, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x230a8}, 0x0, 0xffffffffffffffff, r2, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r3, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000000040)={0x1, 0x2a, "0fac497f99df11f3d2fbe38b728d233a253783e23e980fda7498161b39bfb0f105e37a7d8fa592287304"}) socket$inet6(0xa, 0x802, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000080)={{0x2, 0x0, @descriptor="6c0a3ba39ca2c33b"}}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:14 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) ioctl$PPPIOCSNPMODE(0xffffffffffffffff, 0x4008744b, &(0x7f0000000000)={0x21, 0x1}) socket$inet6(0xa, 0x802, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="14000000fd4b8bc2831f48b129f33e9db89c590000000000cf0aa9a90348996fc65bdd7513730afa553dd5d60dbed6f7aab3cabfa9b95c08c08078b7b85b83ed50431aaf5d0403986fa5afeff97594e56575dbaf5f4991ff0911296f9dcff0222247958477aec141282c2f9621f9310a7b771b403ee10968d02b031f55b410b0d2c4eee51ea2d414a364f99475"], 0x18}}], 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r4, &(0x7f0000000480), 0x10000000000002a1, 0x0) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) r3 = openat(r2, &(0x7f0000000000)='./file1/file0\x00', 0x411040, 0x18d) timerfd_settime(r3, 0x0, &(0x7f0000000040)={{0x0, 0x1c9c380}}, &(0x7f0000000080)) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r4, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x4) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) r4 = socket(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r4, 0x890c, &(0x7f00000034c0)={@local, @mcast2, @empty, 0x0, 0x40, 0x0, 0x100, 0x0, 0x206}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') getsockopt$SO_COOKIE(r4, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_MEDIA_GET(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="300400000ff8dc3b0b1992623a02e942a7880c8258bfbb384297908015fe134455c1e8e45625205304410bb96ca08d4d80d44774f7241ef3e35f1ef17805e30e39ff8165729f0f52836e72aaced47b97d0c2ff77e441f11851922e4aa4f2f1369cda928e0200"/123, @ANYRES16=r5, @ANYBLOB="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"], 0x3}}, 0xbd96b9f073d96152) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x74, r5, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x213c}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffc}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fefffff}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x40}, 0x10) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="140000000000000029000017340800000800000000000000"], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:15 executing program 1: r0 = open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000000)={0x2000}) socket$inet6(0xa, 0x802, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8100400}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0xa8, 0x0, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'teql0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x100, @empty, 0x6}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xcc, @local, 0xffffffff}}}}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1d}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xda}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20000000}, 0x405c) write(0xffffffffffffffff, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:15 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) sendmsg$netlink(r1, &(0x7f0000000100)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfc, 0x2000000}, 0xc, &(0x7f0000000080)=[{&(0x7f00000001c0)={0x90, 0x19, 0x710, 0x70bd27, 0x25dfdbfe, "", [@generic="8dc2aa30e5fd4af94a25f2952694d9cce5d49506f8afc3ece92ef17b3129129fb69415010c394393", @typed={0x14, 0x71, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @generic="0aac54ba7d12e12994941aa55cce90ae130ecd3ae40d8baf4415ccb12c5acd7e16229b590af695ec451b0d1c9d038efa13c0497311d3e0260a7f07777d03625e305eb4"]}, 0x90}, {&(0x7f0000000040)={0x10, 0x14, 0x8, 0x70bd26, 0x25dfdbfe}, 0x10}], 0x2, 0x0, 0x0, 0x20004040}, 0xc000) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="28000000000000ffff00000000000000d18ce7a5de694b82b5ea6cd79ac0f745918daeebdf5f000000100000000000000000000000070000"], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file1\x00', 0x7, 0xe5, &(0x7f0000000380), 0x20000, &(0x7f0000000200)={[{@errors_remount='errors=remount-ro'}, {@acl='adl'}, {@nouid32='nouid32'}], [{@appraise='appraise'}, {@fsname={'fsname', 0x3d, 'pagemap\x00'}}]}) r0 = socket$inet6(0xa, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1400000029000000340000000800"/24], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:15 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) socket$inet6(0xa, 0x802, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x10000026f) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) rt_sigreturn() setfsgid(0xee00) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f00000034c0)={@local, @mcast2, @empty, 0x0, 0x40, 0x0, 0x100, 0x0, 0x206}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="300400000ff8dc3b0b1992623a02e942a7880c8258bfbb384297908015fe134455c1e8e45625205304410bb96ca08d4d80d44774f7241ef3e35f1ef17805e30e39ff8165729f0f52836e72aaced47b97d0c2ff77e441f11851922e4aa4f2f1369cda928e0200"/123, @ANYRES16=r2, @ANYBLOB="00082dbd7000ffdbdf250b000000b000010024000200080004000500000008000400e500000008000100070000000800040002000000080003000100008008000300000000001c000200080003004f92000008000400ff0f0000080001001c000000100001007564703a73797a3100000000100001007564703a73797a31000000003c00020008000200648b1dd2080003001e000000080004001f00000008000300080000000800040001010000080001000200000008000400200000002400090008000200030000000800020000000100080002000000000008000100060000008c0004001400010062726f6164636173742d6c696e6b00001400010062726f6164636173742d6c696e6b000054000700080004000010000008000200010400000800030007000000080004000700000008000200ff01000008000100090000000800020001000000080001000a0000000800020003000000080004008f0000000c00010073797a30000000002c0007000c00040004000000000000000c0004000900000000000000080002004a9a00000800020000100000d40004001400010062726f6164636173742d6c696e6b00000c00010073797a30000000000c00070008000200000000001400010062726f6164636173742d6c696e6b00002400070008000100020000000800030008000000080004003f00000008000400050000000c00010073797a30000000002c0007000800020005000000080001001d00000008000300010000000800010011000000080003000500000014000700080004008000000008000300040000000c00010073797a30000000001400010062726f6164636173742d6c696e6b0000d4000400240007000800040006000000080001000b000000080003001c05000008000300090000000c00010073797a30000000000c00010073797a31000000002c000700080001000200000008000200a90000000800010017000000080001000f00000008000300018000005400070008000400000000000800030000040000080003000002000008000400080000000800040008000000080001001a00000008000300720c00000800020004000000080002000100000008000300ff0000001400010062726f6164636173742d6c696e6b0000b00001000800030000040000080003000200000008000300040000001c00020008000400fbffffff080003000100000008000200ff00000044000400200001000a004e24000000009635bfaa487f4c9defbd134edaf65ca804000000200002000a004e2300000ebf00000000000000000000000000000000050000003400020008000200ffff0000080004000800000008000300030000000800010020000000080004000400000008000400f7ffffff380005003400020008000300010000000800020001000100080001000c0000000800020002000000"], 0x3}}, 0xbd96b9f073d96152) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x124, r2, 0x4, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0xb6, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK={0xe0, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x1a8, 0x2, 0xcfb7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_NAME={0x3ba, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x0, 0x2, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x846}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x12f7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfdb}]}, @TIPC_NLA_LINK_NAME={0xfffffffffffffebe, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000001}, 0x1800) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r5) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r6, 0x0, 0xa808) r7 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r7, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file1\x00', 0x8, 0x3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:15 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="04024a7c6c3d09ff97f04e887c1a7c55e0dffe0e62a57794380ced0b062aeb86dcd1eedda0383c45b63d3c17e302bc35e38ad1f052e5fdae8d6ea7fca74f63b3576012a34e9687741bdd4a2314ab31e8c7e32887027f170f0cc00ccce8beeb74f8c1c808002aaf0b53498620d1b2ec05ffc17897e24c6d88edb93240a5d4c3521b3ceb6c272f4e2758285affffffcfbbf9d944adff20147872b9747b03b001f85750a61d6979861c946d57842de894d24a811ea0d679f84937"], 0x6, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) r1 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/create\x00', 0x2, 0x0) fcntl$setsig(r1, 0xa, 0x9) socket$inet6(0xa, 0x802, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) clock_gettime(0x0, &(0x7f0000000000)) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x9d) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000040)={{0x1, 0x0, @descriptor="006e3104905e0ac2"}}) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r3, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:15 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) socket$inet6(0xa, 0x802, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) getsockopt(r1, 0x3, 0x1f, &(0x7f0000000000)=""/129, &(0x7f0000000100)=0x81) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x7) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000200), &(0x7f0000000240)=0xc) write(0xffffffffffffffff, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffef, 0x8}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, 0x0) fadvise64(r0, 0x0, 0x6, 0x1038b8a147545c58) poll(0x0, 0x0, 0xffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000080)=@get={0x1, &(0x7f0000000000)=""/124, 0x3f}) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000340)={0x0, 0x4, "77458fec"}) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1200808}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x18, r4, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r5, 0x0, 0xa808) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:16 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$sock_netdev_private(r1, 0x89fd, &(0x7f0000000040)="4d2749ec2205bce2f90068192d3dc6c4691c03c946e4079db910d7efee899f87b82a907caf5751d32cf3e8ad0177dcfd7a878b") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x1d2) ioctl$KDDISABIO(r3, 0x4b37) setreuid(0x0, r2) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r4, 0x0, 0xa808) r5 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r5, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/context\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = creat(&(0x7f0000000200)='./file1\x00', 0x185) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000100)=0x6) r4 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r4, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r5, &(0x7f0000000480), 0x10000000000002a1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000280)={{{@in=@remote, @in6=@empty}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000000)=0xe8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:16 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) socket$inet6(0xa, 0x802, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000000)) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0xff, 0x80000001, 0x80000001, 0x100000001, 0x7ff, 0x6, 0x8, 0x140a}, &(0x7f0000000040)={0x7, 0x0, 0xbc, 0xffff, 0x101, 0x2, 0x6, 0xfffffffffffff001}, &(0x7f0000000080)={0x10001, 0x6, 0xffffffffffff7fff, 0x6, 0x3f, 0x81, 0xef, 0x760f402d}, &(0x7f00000001c0)={r0, r1/1000+10000}) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = socket(0x11, 0x1, 0x3) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="10002dbd7000ffdbdf25070000004c00020008000200ffff000008000200ff0f0000080002000800000008000100ca000000080001000300000008000200090000000800010001040000040004000400040008000200080000000c00060008000100f7ffffff"], 0x6c}, 0x1, 0x0, 0x0, 0x24000041}, 0x80) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:16 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000000)) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) socket$inet6(0xa, 0x802, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:16 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0xfffffffffffffda3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x305) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r4, 0x0, 0xa808) r5 = socket$inet6(0xa, 0x802, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r6, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$PPPIOCGDEBUG(r6, 0x80047441, &(0x7f0000000000)) sendmmsg$inet6(r5, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) accept4$packet(0xffffffffffffffff, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001880)=0x14, 0x40000) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x80000000, @local, 0x5}, 0x1c, &(0x7f0000000080)=[{&(0x7f0000000040)="ee3084b9257274ac08198fc79a22929b3ae25667b556e53c781c6c3534d8f51d248b2f1659eb66c42e62622f1c6c71a8c37dd4f83b123c4991e4025ee2a58b11", 0x40}, {&(0x7f0000000280)="a6fc8b2c5fcd911641358b679979cb9119eb20f17f98c5e8b824b7c3fb246a0f73c269e294d15110eab02b650d4452e6050c42cdffc932566b04c0812e93dc8e377a595b0d2787925a84ebbe0fa03798f700b52e63222778fb0bdb895bd390c063d77f948ffc31a5c1a5d5d049addb2152d232daec25d681b54344ae189f4196bc0199f47dd7f9e359361211428624e68f27b4861169558eef7f2c99a7cd478526091bce57945e48b5fb28ba0b695ee26c019d92ca04e13aaa6058a834d88669eb7eb0449f693e303d203c1406", 0xcd}], 0x2, &(0x7f0000000800)=[@hopopts_2292={{0x20, 0x29, 0x36, {0x6c, 0x0, [], [@padn={0x1, 0x1, [0x0]}]}}}, @rthdr_2292={{0xb8, 0x29, 0x39, {0x29, 0x14, 0x0, 0x9, 0x0, [@loopback, @mcast1, @empty, @dev={0xfe, 0x80, [], 0x1d}, @dev={0xfe, 0x80, [], 0x1d}, @remote, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="35484236b95f873b7064b9e91c3143c0", @mcast1]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x80000001}}, @dstopts={{0x70, 0x29, 0x37, {0x5c, 0xb, [], [@hao={0xc9, 0x10, @mcast1}, @jumbo={0xc2, 0x4, 0x900}, @hao={0xc9, 0x10, @loopback}, @padn={0x1, 0x1, [0x0]}, @enc_lim={0x4, 0x1, 0x8}, @calipso={0x7, 0x20, {0x7, 0x6, 0x6, 0x3, [0x1, 0xe13, 0x8]}}, @jumbo={0xc2, 0x4, 0x10000}]}}}, @hopopts={{0x168, 0x29, 0x36, {0x11, 0x29, [], [@enc_lim={0x4, 0x1, 0x7f}, @calipso={0x7, 0x28, {0x6, 0x8, 0x2, 0x3, [0x7, 0x7, 0x9, 0x277]}}, @enc_lim={0x4, 0x1, 0x2}, @jumbo={0xc2, 0x4, 0x1}, @calipso={0x7, 0x40, {0x9, 0xe, 0x0, 0x4, [0x0, 0x400, 0x6, 0x2, 0x0, 0x0, 0x7c]}}, @generic={0x0, 0xcc, "a6beeff55e08a005ece07f83b2cfc85c5a32db10892f542324fa0cb74721cb311d4f0a40b8f916a7662fe06168138a6f1d153f92a8bfa8ee587bbb92a4ca4eefe39e2d05865ba17d770eae7cabc69f7a13d582f672225afb5435aedb7883c0533d6cb9ad194c89ce3a697e12f57d62cfd2927f7cf53ad17fcbe963006361c99e2eb41eeb0ca1efde57ea14d262a7a84be93fa5c76e4ce057cf5972339c5366b0e293a1fd764f3d4f35cf82148d0a67d2f7e504f948deb4e2269e010709410a968ea95377f705550e3b064fe3"}, @jumbo={0xc2, 0x4, 0x8}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7}}, @flowinfo={{0x14, 0x29, 0xb, 0x2}}, @dstopts={{0x30, 0x29, 0x37, {0x87, 0x2, [], [@hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}}}, @hopopts={{0x148, 0x29, 0x36, {0x0, 0x25, [], [@enc_lim={0x4, 0x1, 0x4}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0x2b}}, @padn={0x1, 0x1, [0x0]}, @generic={0x5c, 0xf0, "d6c28d4789bd515600149b8bec10b2355ef8c4a6156a6aff837ca3408fcd8ab6afcd94aaa9f72953c8a244e71df93b794cc9ce9b99e0e9fb82180c2c37c726aab45b790b0b90fb2c3aecf8675d1808d57a55a271cc77c79b11bf8c65ee47584614bc554f4b079fa6a65be46118ab75059ab83225961cf82aa9c2534bf7eb8e11e7f6c25d2054e42697b7724f42c66091671a8266bf3983a994020f781ff755c02d461b0884e7a8014336ec7da8b5e16e25140cacb4877412de8d89973f8e849ec3fa1d2f7e1d38885f11448c7cbc3be208bcdbf594037930b5ee67ee6fc17e57a14b5e5cf3de6c8856ea5794fab41d51"}, @hao={0xc9, 0x10, @remote}, @hao={0xc9, 0x10, @empty}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x1000}}], 0x488}}, {{&(0x7f0000000100)={0xa, 0x4e21, 0x3, @dev={0xfe, 0x80, [], 0xe}, 0x6}, 0x1c, &(0x7f0000000200)=[{&(0x7f00000001c0)}, {&(0x7f0000000380)="698c319a7fcd289eb52b83b78df60270081e4bc27fa6c39d11e07db9f8ce77668a717d56e09c13aa9aa48aa329530eb30194cd69a351d814ac96e80dba6fab362675630855662ba1209aeb961d76d386ba7875961ffd0e4961af05d587bd4d75a21b931ad94bdae43f0b51a56455f7", 0x6f}, {&(0x7f0000000480)="71af15fb49b8c1d25c3546331e16e1407367ea11f5881a34d8df43de87fce04a922ce7f335540db6e36bc249e2fb0a84b300a59001e786073ffc428eecf8092cb253e2e529d16dfb907374e4a73424082521ae834a41745b498a27220342d67260ea4249d5ac302ea258d9ffe49e61861536e239c434241bf128051ed7c1f0e67302742cc346d85d05d005aec3dba830840a4fd1f312a619a99b609494117537dae2d98dc764170b30e01eaf0fa2363d71a6c1cc56eb73d2ffe32f6b81cecc861274b986d8ae488ae757e5775b58c0f16b8ff7ebda96650296fd", 0xda}, {&(0x7f00000005c0)="bbe95bd35bccfc7c960b1f1e68395e06a1117128432acaa70573b577a81a6eda46b01c675de875e4bace3a8d6ab1918cbe3cf08ecd292007d9b4ed0d482dad91361eb7bbc9095cdd6c50b546976ca8cdce54265f4f81363e3cf4b45c", 0x5c}], 0x4, &(0x7f0000000cc0)=[@flowinfo={{0x14, 0x29, 0xb, 0x3}}, @dstopts={{0x38, 0x29, 0x37, {0x16, 0x4, [], [@generic={0x3f, 0x14, "a8163f057db5939347e5c3266d95b56f40a41443"}, @ra={0x5, 0x2, 0x5}, @pad1, @enc_lim={0x4, 0x1, 0xff}]}}}, @rthdrdstopts={{0x118, 0x29, 0x37, {0x0, 0x1f, [], [@generic={0x4, 0xcf, "ab29438fee4ba837fa7fb19c5d65458eaa6d20a4aae07f61bd1714922a80178b3840e64465f78bd6ce98034f045590ccd926403581a5d09f611b37b3aac4c0881cb122183c8fb6fdd617b1b051d2b326a7c640fb0926781140b235ac1346538c4677ecae8f4b76f1763c7a11b5c6481af65328f59a31c28ed7ab5e3bcf0fbf5d33a7e9ee67b8e5f06e707791d565b82e7248f9fc1f7e5f58ddb6bdc0448d530959321e0234b36f9cfac7b8d8e4b7ac81bf112f35fdfd073b4c630e402f8847cabc7f4c8f80a0ebf989e4fc9c9804a9"}, @jumbo={0xc2, 0x4, 0x8001}, @pad1, @pad1, @hao={0xc9, 0x10, @mcast1}, @enc_lim={0x4, 0x1, 0x40}, @jumbo={0xc2, 0x4, 0x6}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @dstopts={{0x88, 0x29, 0x37, {0x32, 0xd, [], [@calipso={0x7, 0x8, {0x101, 0x0, 0x2, 0x1}}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @generic={0x81, 0x52, "b21e33cf50ba45767452e8333c0d9d946792f7e28c53497517dc0fd432fbbcc64e883dade6c43086da52d460f5bb0792dac8f0b71c6f15e1b2d472f83b1a1c510b4ad6beffeae74c61aaa725db35887141b9"}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x4}}, @flowinfo={{0x14}}], 0x220}}, {{&(0x7f0000000400)={0xa, 0x4e20, 0x2, @local}, 0x1c, &(0x7f00000006c0)=[{&(0x7f0000000f00)="e0ef59b13cf36ff65b6ede064c3003f57440d9db8ae5d39edbf85fa1ebcaa22cced1ab680946b0c32e1918057ebe99511ef99899b60699a30d1594cd137fdd8c0daccc081d25a485c215e140f96f0de749f395f35563a1a452d7e249201061136d9cc87da0b69b08a6e406debc41c7f349ab39adb45c5af6870c3bf9bf6ad227b62f06ed13fe346adbf7eff049a47a44bdd978948fcf76ed5784b4c2c33ca0021be163562503eb82c993751c81a6a0f9cc58c62baa6f56baf621295b04f87d51fb07b44bf94220fa95fd012a716897", 0xcf}, {&(0x7f0000000640)="d235e4464b3c92c2b5d1dbf600028fd932f598a527d67793eeb7d0639549c09ce3c1424295f6d88b79a046ae197ddbaed74c0c33b99026d564b3f7d748", 0x3d}, {&(0x7f0000001000)="952a519e0fa7a905329f8e69e1260db1cf8fd861fc854e2ccb13c89390e227d7f8247a4af9e66f415f6b91c53585ffad450f8a2d4214b4c2dbdce709d30682a7dd8f97f5d103c19224a09d2d16f7d5b1ac7ae3c3d31935283c9a7793585a108d1b", 0x61}, {&(0x7f0000001080)="6d59c8ea7159e81674e6f57e5fa94aaf2413cf6cc4e77b7f7b025db32c0e29606243aa0b7f36bb0624c7d33d79648e19b37389f0885dc6ee34580fca478d887c1842ca6c5f28154bd04558c41f163d7349d1bfd029d8642152cfec98656ce8f7754a1b3120475533ef32f90819456d827a6d63e475d305ab47ba47054d", 0x7d}], 0x4, &(0x7f0000001100)=ANY=[@ANYBLOB="b800000000000000290000003600000032090000000000000107000000000000001f90b29ed901ddf395ddad618829216d287497b8b02ca3aef3b853e613699c49d929c3fb117d754d68cc0d59127a3706000000bf6e843af1af83e56ab87da25b905adff8fcd544285c7e65c0e3aa2f17041423d7edd9ffe4d9b3f6dc591a8206eb2d719f9871d1a1238b37af8c3760b761af1195ca286519c0272bbcf5246e86419b73e1f0f018816792e08d9716afe452310000000000140000000000000029000000340000000800000000000000"], 0xd0}}, {{&(0x7f0000001200)={0xa, 0x4e21, 0x4c5, @remote, 0x7}, 0x1c, &(0x7f0000001780)=[{&(0x7f0000001240)="064a6c3aa96e2802a2f4d747e8442385be26d04b1c6add3e1af19272d373986ad1ddfac9e942364908fef285796a1d6150420b2269ecd077ac0b729ca814e46fd1f117a63910a6ad629cab5c7389c84faac8ea287c2850abbb4059615e2f27d26ab1dcfaddf95b4590e561ac826b4167bd7199e221953b6c5bf6251cf8b0e7866bec79cdec73754ff7a5404fab1f5ed3b4c6fc773ee7cf3a7020c92bfbbf375268e5589842845da5372c3c0cefdee9a82aea878ae4b04722dd158c06ab", 0xbd}, {&(0x7f0000001300)="9432a43e27dab3c7303c073e65985c3cafdcdca892bbf6fce8fe24e06f6e676db1ddd24c81b54d06673f259ca243f2f906f4044021e13a5f8e308cb8543f05d0a6b67d2ce9a7bcc0c31f66e414929b49f32f8607b13cc782132f10fe1e66b17d4da998293332dec33398513bbc8398ab393ea2e14469bd39a6bc2b00afd9cc610b5bc142dd6f10974bea85d72bc2c858f8c27a756d2745febd2ce438e4efa10b191727123ec7f895048060709fd2", 0xae}, {&(0x7f00000013c0)="3adbb55eff4c2b31294acd9579e08c83ef91e03855846d65630f6b897a2a55e94f624dd397bb3097fdf3c52d77009348c0c17e26f0d7b7cda6d489fc1333c70507bf5a76361a3b5298b5662e5c065d3fe29ab42e92a40075c428f6a2f593bb71904322b4744280d48a4e817562d48f4a6f4a61e3846b79e252b7a182cbffc14ca9d9a890a912cc6c2723d0ccba47071cde", 0x91}, {&(0x7f0000001480)="06bbed556a8aa73b5a2a3342464feefd8bca47f872ab9d44cbf44a5b88f9ae6ccbfceeaecf25356ca4a74df02e998941b49a70a3c1b067eba1d5cad49d777a", 0x3f}, {&(0x7f00000014c0)="46e7cf7975347cbef1b996a73be8a65d7e52b51b559f5b7fcfa265fc23e3952ae7f39574cc7d08755f32e962447d1b06128696f334e4373c4bd68c03c5f89548552924afc338b2da31ce8e11fbcc08cd3179d700b77f6ee9fc4600f69b5d79451dcd4359664ff6c6ab5c32e93da6769c93f82707", 0x74}, {&(0x7f0000001540)="e69d79e2019c53d17bab20b44537d26fc4c4cfd9c5bc4969fefff69be020a68a7bfea8ea", 0x24}, {&(0x7f0000001580)="29c4392514d9faa1d436895647e68849b3bedc99ab7eb360b91e67a7a5411c2cee4f49f8a93413afb56272f1a469c58e87289802e1703560cd09bf65e78576c8b152fa8300b11036a108a42638318c6a62c8e4ecd2af95a4d412582ac37b1b3f8fbb02b0c95d53abde9adcbed8dd995c82fc02767488cdb53a4d65a836c291e2a467219db99930e73aa573ff296cae5faa183d160393", 0x96}, {&(0x7f0000001640)="85c309cb1295765bde3aabd7d2b0b77ce37689786d482eb5ceee1255255e9d0513e68d90d0ee6bdda0191bffaf2b7a", 0x2f}, {&(0x7f0000001680)="bec07564c3a277024ab17c3e56f001dfc2834528059e0ba0145997a705321d78d855975f9ca0fcacd46a82dab0b3fc47b361bafd11ced7646305066a9bd0df644e0b3830c8515a5c3619da0671a1687e4917c50d78206b8c826d357ac69380236e66ffb7524629a2e1ad0f6270b513a2548c58975832879e5c2bd7122bf3897a4fa90939eb0a312785d28127730b30531370991510d6dbaa37a4743160a3965e01046b0cc5515b272ad49a290df3e6b6bba0b61ca01770516d011bc428e06d90acf724c01cacec60934957ddfbdc8500fcf8d8d87a5c98c60c3c380037d97c76f2a2", 0xe2}], 0x9, &(0x7f00000018c0)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback, r4}}}, @tclass={{0x14, 0x29, 0x43, 0x101}}, @hoplimit={{0x14, 0x29, 0x34, 0x2}}], 0x58}}, {{0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000001940)="f9ed896a97be7ef947cc5034c824c8c2430bb19137078d7bde427ef304dc1a8ff4e5f526d1832eba8d8be5cbd6c55c8706deff503c63bd86d884cc256545a795a90d6f279f908029fc374dc4b133556c8315b464b38aa0ef9f", 0x59}, {&(0x7f00000019c0)="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", 0xfa}, {&(0x7f0000001ac0)="fe170f48f65b5a0a8fb5c8bd4a31a621bc250a4f9dcf9ff3867b", 0x1a}, {&(0x7f0000001b00)="019595cf7c2e4435185a70d8bb968341a7e74e7c0a413d9ddda2f1bd0c7b7016653ec46429de9e61077203345b34e38b301e686ca379a302fb74df24b67c01e1c157fef211ba64b4bbbe772b670d9e0bf0626f1babef7d816b5af7a3962c42e26ccd98af57941dd243951917ec77290ded32806ba833aca47a83e43f2d3d51e583bbde83a225a5470d3b66a9331373450b816002b86e972900e25a4a5d7d41034463180e2d69106b8de49f9cd837dda62c878aa54381fc542f0450eaa541b7a8c908d33e7acb085f2809ed417993934750bc28b66eefa82860", 0xd9}, {&(0x7f0000001c00)="9ac652a3391731e809af46ca34a358c18ca877571516a36a32e03410b89f66bc21edcf4bc610e99fb029e66a2dc485e9ad4c49e3938e217a9b53f4a1bc1f397029f7f940c87f6c1aa16f86e43287b060e5ac0bf04062751228da11f3cd8b87b8980ebf837bcfcb9a66a8e9a6558442d16d0da3e6c3948c79d68cd5ad56bd15aaa9a24aea888d08624d119c5721cf0a3bfad28b0f0568772d36f38e16b60c64cb8c422d80e2d9b18ba8ab77ce3c75977f93fe9c382e622b435bfd4a0b8cb104", 0xbf}, {&(0x7f0000001cc0)="f1aac19db200d630a00516725101babec29b91c36798ba669795aec826e02171f3ae8301d1bc4d7ceebae7120a6467f09a669266f43d430bbca3af60ea94b4a4daebc8e4e4ea55732e6ed6be467ab8462db9dfc2439fff9b63b10d37b58362fad4c8073de332", 0x66}], 0x6, &(0x7f0000001dc0)=[@rthdrdstopts={{0x58, 0x29, 0x37, {0x1, 0x7, [], [@enc_lim={0x4, 0x1, 0x1f}, @jumbo={0xc2, 0x4, 0x61}, @generic={0x5, 0x2f, "93edf7faa76920c6318b78e28978971fd3a5884a304e6ba8c019bec8dbc75a618d2270d06d4ed81b3d805659f02a9c"}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7e5}}, @dontfrag={{0x14, 0x29, 0x3e, 0x100}}, @hoplimit={{0x14, 0x29, 0x34, 0x80000001}}], 0xa0}}], 0x5, 0x0) 12:17:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000040)={0x5, 0x20, 0x0, 0x3, "40b75df8a063faba8ed67e904e68e6a24de31f46bcb9d18127535b2c05785490"}) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:16 executing program 1: open(0x0, 0x20141042, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x1c0) poll(0x0, 0x0, 0xffffffff) r1 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5ad, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) write$P9_RVERSION(r0, &(0x7f0000000280)={0xfffffffffffffe9f, 0x65, 0xffff, 0x6, 0x8, '9P2000.u'}, 0x15) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) socket$inet6(0xa, 0x802, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000002c0)=0x4) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) r4 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r4, &(0x7f0000000480), 0x10000000000002a1, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0xac, r5, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bpq0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x5}]}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x12}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x3a, 0x1}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x2006c885}, 0x20040000) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/access\x00', 0x2, 0x0) 12:17:16 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="280000000000000000000000000000008ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f00000010000000000000000000000007000000e23d63cdf13ccb6838e179879f3ede42c860f776b94f2a78bd219c56b2930bd59584e44d4ce0ed20467adc320053059e862001d40000000000000000"], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:16 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xdc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) socket$inet6(0xa, 0x802, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', 0x0, 0xb4, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) pidfd_open(0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="280000001400000000000000000000008ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f00000010000000000000000000000007000000"], 0x38}, 0x0) r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$unix(0x1, 0x3, 0x0) close(r4) close(r1) pipe(&(0x7f00000001c0)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r5) close(r6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$inet(0x2, 0x2, 0x0) splice(r0, 0x0, r6, 0x0, 0x4, 0x0) close(r6) write$binfmt_elf64(r4, &(0x7f0000000100)=ANY=[@ANYBLOB='H'], 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) 12:17:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'team_slave_0\x00', 0xfb10}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2007f, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x526424a0507611db, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) write$P9_RLERRORu(r0, &(0x7f0000000080)={0xe, 0x7, 0x5, {{0x1, '-'}, 0x3}}, 0xe) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000000)='gre0\x00') connect$inet6(r1, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xa808) socket$inet6(0xa, 0x6, 0x0) r4 = perf_event_open(&(0x7f0000000240)={0x5, 0x70, 0xff, 0x3d, 0xff, 0x8f, 0x0, 0x3, 0xe804, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x9}, 0x10841, 0x1955386c, 0xc0000000, 0x1f, 0x401, 0x8, 0x9}, 0xffffffffffffffff, 0xf, r3, 0x1f) perf_event_open$cgroup(&(0x7f00000001c0)={0x2, 0x70, 0x3c, 0x7, 0x40, 0x7, 0x0, 0x7f, 0x8000, 0xf, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000040), 0x3a9a4a1c735ba655}, 0x800, 0xb96, 0x3, 0x0, 0x5, 0x100000, 0x4}, r2, 0x3, r4, 0xa) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:17 executing program 1: r0 = open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) creat(&(0x7f0000000380)='./file1\x00', 0x100) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000)="a5f9ac26f52f969c84ab0e52823a88cea9efb568f7fe71d08a2f2ec6221ee727e0df15064a97d0b15c827f5ffdffb552a67b5a94a2d56d7d1ce3f99de520c97a7cf48cc4dba205b3d8bb2d01ebb79da9f036ee92637e331516091dd887f14319983328c6cb155fe32ea2a11a175a3310f50ade6778", &(0x7f00000001c0)="fa86f2d4c987eb7fa917e5b962efaf1695bae6f807617d270f19d86395ed7162941ea3cb02bfe342b6968a2dc6f20dd497188dd64c1a1763dfc8bc7d17bd9c06a921a75e0a6b3382a905c80cb2321a52f31f0ad4931a723918a59e28aebb46537ac74b12bf8ce0f4f90bff73b698f6c8f541c75cac3c7a33640c87c64bfa12bd7f10b6da9101d0d7cdfd2b95a11d9ec5870dbabc8f0e6b886394accfa03e247d3301e23bdd8bed465d3e727dab0c2235ab734fe8156e2d808e2689331e8aeef28c1dfb4c23eff2edf0b05b089593", 0x819e7451fdcb4fad}, 0x20) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) r3 = socket$inet6(0xa, 0x802, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) r4 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f00000003c0)={'icmp6\x00'}, &(0x7f0000000400)=0x1e) preadv(r4, &(0x7f0000000480), 0x10000000000002a1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r4, &(0x7f0000000940)="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", &(0x7f0000000100)="e38e41335f7d1d999dda9fe1c4a41c074450ff38bf68fdc6d92bb606714b79104a3d7af5fc2a2ec64b695b9e22b3af6536d0541e9d45809082fedd9c0e", 0x6}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$PPPIOCDISCONN(r5, 0x7439) 12:17:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:17 executing program 1: open(0x0, 0x20141042, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf28, 0x9, @perf_bp={&(0x7f0000000100), 0xf}, 0x4110, 0xffffffffffffff08, 0x0, 0x0, 0x3, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r4, &(0x7f0000000480), 0x10000000000002a1, 0x0) r5 = creat(&(0x7f0000000140)='./file1/file0\x00', 0x1a8) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r5, 0x0) fstat(r6, 0x0) poll(&(0x7f0000000080)=[{r3, 0x2200}, {r0, 0x2004}, {r4, 0xc021}, {r6, 0x100}], 0x4, 0x5) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r7, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$int_in(r7, 0x5421, &(0x7f0000000040)=0x3) socket$inet6(0xa, 0x802, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) write(r6, &(0x7f00000001c0), 0xff0b) setfsgid(0xee00) open(&(0x7f0000000000)='./file1/file0\x00', 0xa2428541ecddbbda, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:17 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @multicast1}, &(0x7f0000000400)=0x10, 0x0) sendmmsg(r0, &(0x7f0000002180)=[{{&(0x7f0000000000)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)="62adf5e03a2dc02e49581d56c5", 0xd}, {&(0x7f00000001c0)="e4cd99ad188a0753be4e52a326679bec441a1fc9525b8b0618bdec4c7e1627cf89cef3c9238cd85e852e13a266b946d65339c4063448b0b87d8c5ec0198af6c5b3a4e07e21823f8cf8d1a322f9164b15c208b9b6fca1a110a4dc6e88c60487cefd5298c41b5a365ff4085ab3235a3f5a91bc9813a2edb2dc4da39b1bda949623ffc61bab4c7f3fd1568c1241e826432a52184194306546cc6e7ac32469c8de41976b8b1848684170064d6dda16be05b72ca46f2e58cc6f55b6e9c424095794da09c016a8", 0xc4}, {&(0x7f00000002c0)="b5aa7565972351afe88d22f3448351041e029447c7a7393e912638a6684be252f5ddae5a3840211a3bb54d1b60b203f7f8e2e5063e334223de69cf8c3a863e3c99139b84f92a2caa97a9b3764f06e145914d62f8ed0fa13ac441a59b599ab78eea08f42357a5178066ecd24b08381660b9f81012a57bb4c50a814b7db0235632c0e590ee40e278e169b7ac2cea733183df449dfb08f5a66e99929c52593473c74f3be834008f09ffdbc9a72ab795e21a397b9277530ad8dfd8b4041d96f07178f880492f185115f3", 0xc8}], 0x3, &(0x7f0000000800)=[{0x40, 0x29, 0x8000, "5bf38382e4fd44310142ef0a181f1a3ffd3ecd3d3b2ac6bf88f8532f679efdf7a95f5fe726bc5595ba12"}, {0x88, 0x119, 0x8, "f69f3f4a9e7bcff6a4fb341a7ed892927cfd5093588b988dd87a5380462451c11ce2c7433d1ad37f35396f36fca02540a15fc749d87a2ef97bb2c768385be62214d55c2b210088bdd2d47673b5acd6584e0a9650aa72b608e7bf3cd07b2f63b05a4e4cd724391912606cf2ded46b64c2b1820b"}, {0x38, 0x103, 0x7, "b7772bb7dde4847c1802e7b47cab3cc636515945757b84412d974022709092b3b4b166a4b5bf79df"}, {0x58, 0x111, 0x101, "6e409f688e35de0d50af3212790a52dea02af685df0a48a347daa6cdd0cf6d0ec9f3aaf0aa4b36267d401dfb3d38e19ee642a51f5d92df24a20dfb9165025784fd1e7c01"}, {0x18, 0x111, 0x67f, "7108b6b98f4481"}, {0x18, 0x108, 0x40, "e1378d217844d0f0"}, {0x58, 0x102, 0x2, "4232c1dd90dcda644b09b3446741594cf775ee2844956ff92b379f8e64f21d85095b43411bfccabb3d24e1cc75ed55f526265b43cec99cd15b9a6ead07fecf8ef87b"}, {0xb8, 0x29, 0xad21, "8d0c1a8ab97f2363850357a46f8265c43c85952af743b1b2f61a7e97189dfc11e02743e679ada16027bb0cd2a4258550c4aa55d4594f0b015c43a982d3307fdacb981dc55af5c5a863a42738af7a34b092d25b317d90292ea811610f87731fecc084b19253f9bb439e92a83747ecb341dc9417d2ba4e966c5465357e8e545e22e8237dd6a2bc1d983a9f37990f7801ed63d715063f3a8eeb3a2200f252e5d2e059"}, {0xb0, 0x101, 0x9, "231e45f169b77d6cc852d5d16bdf63d94fd11d7bcc813f708e1bcc07a123d3010673cfdf5743a0d44d0f6b52c48ee54abc02cee0dc966b94e1b4119c0905dca0b0c21ae98a0fa4feeed54bc7ed65b425073ae078230e3ea0b36384ece0e96eb9a1811cadbad78aac40ca5adfebad5e7d859eeb352c2d75e17b4d0b190ddd181a0754ea72738496d3193ec8b837b1d22ec3da8be5c1213fdab984b39e57"}, {0xb0, 0x101, 0x2, "0381880b78d106262ea4604175966753fa12a8a94707132c8e79126e279c98fd4be8e4ad3e30bf23d3d6cf880e23d26e48cb8421f34c2cce4541a6c30876d9c0ac2794120961067b3e9f2844570e3d130a277f4a8c6d8c641885d25c2d7528341c4af581b955719d7b8ece697b17e6f79b68068bb670512209f9ad64fca06e8e3a02f41d248b9e425002b4565ad89395dbf1450a34fbcc00ed007691126230"}], 0x3f8}}, {{&(0x7f0000000480)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x2, 0x0, 0x1, 0x0, {0xa, 0x4e21, 0x73, @empty, 0x1f}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000c00)="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", 0x1000}, {&(0x7f0000000500)="7e77f17beca1d5c4c48cedb503672a46b1191bbcb86858487fc71600c620fa30225fa7e425cbf8bd750dccfd3985bcb3d939699af797c7ee3fb0af09ac5a89fbf588d727d4c2a019be52d9f481e9ea9be876b1b3c18c20b725d9e8aad5bb327399b9c26b4c3d7362a917ddb02b", 0x6d}, {&(0x7f0000000580)="83436528077635c2ca8daac344f6eed6227c6fb9cceb06cf2c781650038682e0a7e20f748c5361ae71236afbbad95268685b91654314fdfdaee7d8a9e2fafd94655456d766f76c136d9c5abb491a5380cd2d71c2d05b19ad63d1373faeb28996b0dec0f5f7bd7a1dab78c0d24549571d24de6166bbb229e56bbc7ecf5680e80d33720dc5c7883e3bbc0c5a94f53836e9fa467aee5e3f27f83fc67a031628f06c583dfa7b18f0b89f3fc8482cd73d6acb603e7a84f45b2818e931e409dd5c992fb341", 0xc2}, {&(0x7f0000001c00)="40a6e3ac6a91f1be7735b8b46445cd705e438b46efdac03c4771edc76b9c5dcf94cd7817508c01f8f96987d2d642225a7823198dc811e3915ec01936a73f9299f206bccaf66fed24977ac468f7edc3db533798d45976f86142f8dbf4ce3b89ce8ceaefa76ebd08651855de6f72687ed0166354647a36bb9da0ed29ea061560ec40ea41a48cff1f2b2185323befaf705866cdab6d", 0x94}, {&(0x7f0000001cc0)="27099e8cef1cceb5d3f23bf201d98254c339d812fe5b09e1ce498081ba7697b40cf5de55858a6fccae1f03065918e3500ec940d89e3648326e0edd7729b11524cace981590e423f8acfb0407812145874150afdfc26ab58e977d2ded3f100204518c666490faac43b360a5d6d1ceb735751e915f49e82d9902a207c6047ad3fa015c93047f9f330dd79f428bb6593132d9a1b5ef65b9e789ffa559920405059068233f", 0xa3}, {&(0x7f0000001d80)="93fa8ab2c0a2e1a4c8d8048b8ee378dd8b645d91b07bc997f3a872e14a53fed291e55ba342764884622352eb3eed63cbf60f4c6fa5a94281623ff250b33e542126290af0ce882e4c240b76d01387e3ac72619e60a29459813c2b0755e40975a018b7e68d28973918501d9a15e0c0085ed59aa0dac2676b182986da461a80f50ecf953530f7f2a52471518d5f5d46b017efb3e1ab1db1ee31c1c54b0c5ea52cf50eaf2adb214a14846d5e3f1d4f664302a6f454c6a868d8b961f439cae660be835fad4b119bd86500e2474ea9a98a43f16068f6dd451193509d0db55e2cc4d256adf52140dec3d35e0fc9333845", 0xed}, {&(0x7f0000001e80)="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", 0xfa}], 0x7, &(0x7f0000001f80)=[{0x98, 0x117, 0x6a, "d998cc4dd6726ff23a8d520619a497b79e970aa9d077e2eecc7da7a584a95d51836834377e9b055e26e7fc899d788bfb23c4c6fd042a523831c3acca78d7b8568a0eb4ad199eec5177a2862ae4e197551d4020b33dbf3f89286bfdacebc2ff5feb7d78767874a892ce3262d1ebff19193441f91a6127ba879c9c051fe7057e72e142"}, {0x98, 0x105, 0x80000000, "53d3639d9e7f54a084543513cc340cea386813df526e78ab1987978f7a21b3a991e757df05026cf5bf27173c966047437b195842ccd9b43aae934bf43f8fbfa8280ac2aa499eb29d58ac5755a8f723c36be1e76a4892d2f38b5d9a5eedbe387ac04e424e9a72af4603669fbba5abd1d0eb3cecb8359b62c009cab4f72549cd8de347"}, {0x18, 0xb931a19130fa1874, 0x4dc, "8bf1687d6b"}, {0xb8, 0xf1c36f3a03015eee, 0x7, "a02d11be7a70fc6d54042d0d1ced1599b081f08bcf5bd8475a72a26f9dd6e68289c35442f8132b7e9f773a097d153edfafe74d2de09df43f03e0b0970838f4db2dbe6c18cf94e62fe880fd0ca5b1adc04ed2fc3b3f0057da2da0116205428e30928adc0c8d5cbe948c5ec5d5fa91c6f23d2775a5d854ca4af84ffa892edb6d92a06eb7d8830fee9929c699d571f3d947528fc84f318f34cb7cbb5903ea10b2dcdcd95c19"}], 0x200}}], 0x2, 0x4006) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:17 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) socket$inet6(0xa, 0x802, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a89}, 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:18 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x14f, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x6, 0x8, 0x0, 0x8}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x2) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) epoll_create1(0x0) socket$inet6(0xa, 0x802, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x6, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="140000000000000029000000340000002c33f84923a5cbbe6252519f151dba0800000000000000"], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:18 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getegid() clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) splice(r0, &(0x7f0000000000), r0, &(0x7f0000000040), 0xfffffffffffffff8, 0x10) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x20) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000080)=r3) connect$inet6(r1, &(0x7f0000000680)={0xa, 0x0, 0x100, @empty, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r4, 0x0, 0xa808) socket$inet6(0xa, 0x1, 0xfb) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) setreuid(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000100)=0x10) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000000)={@broadcast, @dev}, &(0x7f0000000040)=0x8) sendfile(r0, r1, 0x0, 0xa808) write$P9_RLINK(r1, &(0x7f0000000200)={0x7, 0x47, 0x2}, 0x7) r2 = socket$inet6(0xa, 0x802, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000340)=""/158) r4 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r4, &(0x7f0000000480), 0x10000000000002a1, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x20) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f00000001c0)=r5) sendmmsg$inet6(r2, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:18 executing program 1: r0 = open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x14a93cd726bf1a76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x17}, 0x10001}}}, 0x88) getsockopt$inet6_buf(r2, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r3, 0x80003) sendfile(r2, r3, &(0x7f00000000c0), 0x8000fffffffe) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000b80)={0x0, 0x0}, &(0x7f0000000bc0)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@dev={0xfe, 0x80, [], 0x15}, @in6=@ipv4={[], [], @local}, 0x4e20, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20, 0x0, 0x0, r5}, {0xb, 0x0, 0x0, 0x0, 0x3, 0x0, 0x401}, {0x0, 0x0, 0x7}, 0x0, 0x0, 0x1, 0x1}, {{@in=@local, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x12000, 0x0, 0x3, 0x2, 0x0, 0x0, 0x1f}}, 0xe8) ioprio_set$uid(0x0, r5, 0xe1) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) socket$inet6(0xa, 0x802, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e21, @loopback}, {0x6, @dev={[], 0xe}}, 0x54, {0x2, 0x4e23, @remote}, 'ip6gretap0\x00'}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000080)='./file1\x00', r6}, 0x10) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x10000026f) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSSERIAL(r2, 0x541f, &(0x7f0000000040)={0x7, 0x96, 0x86, 0x0, 0x7489, 0x9f, 0x80000001, 0x6, 0x1, 0x1, 0x1f, 0x7bc, 0x9, 0x6, &(0x7f0000000000)=""/32, 0x6, 0x9, 0xffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file1\x00', 0x8, 0x1) sendfile(r0, r2, 0x0, 0xa808) r4 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r4, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="140000000000000029000000340800000800000000000000"], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r5, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$sock_SIOCBRDELBR(r5, 0x89a1, &(0x7f0000000000)='irlan0\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x17}, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r2, 0x80003) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000b80)={0x0, 0x0}, &(0x7f0000000bc0)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@dev={0xfe, 0x80, [], 0x15}, @in6=@ipv4={[], [], @local}, 0x4e20, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20, 0x0, 0x0, r4}, {0xb, 0x0, 0x0, 0x0, 0x3, 0x0, 0x401}, {0x0, 0x0, 0x7}, 0x0, 0x0, 0x1, 0x1}, {{@in=@local, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x12000, 0x0, 0x3, 0x2, 0x0, 0x0, 0x1f}}, 0xe8) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v3={0x3000000, [{0x5c3, 0x6}, {0x8}], r4}, 0x18, 0x2) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r5, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:18 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0x7ff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="280000000000000000000000000000008ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f00000010000018000000000000000007000000"], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000680)={0xa, 0x0, 0x100, @mcast2}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r2) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000800)=@mangle={'mangle\x00', 0x1f, 0x6, 0x6d8, 0x350, 0x350, 0x130, 0x4d0, 0x248, 0x608, 0x608, 0x608, 0x608, 0x608, 0x6, &(0x7f0000000140), {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, [0xffffffff, 0xff000000, 0xffffffff], [0xff000000, 0xffffffff, 0x0, 0x7fc7b6f1dea849b6], 'ip6gre0\x00', 'veth1_to_team\x00', {0xff}, {0xff}, 0x0, 0x0, 0x8, 0x40}, 0x0, 0xf0, 0x130, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x7ff, 0x5, 0x4, 0xffffffff, 0x0, 0x3, 0x3, 0x442]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x20, 0x4}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x3f}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, [0xff, 0xffffffff, 0xffffff00, 0xff000000], [0x0, 0xffffff00, 0xffffff00, 0xffffff00], 'teql0\x00', 'rose0\x00', {0x1fe}, {}, 0xff, 0x6, 0x0, 0x40}, 0x0, 0xc8, 0x108}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0xb6f, 0x7, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e22}}}, {{@ipv6={@empty, @empty, [0xffffff00, 0x0, 0xff, 0x100ffff01], [0x0, 0xff000000], 'syz_tun\x00', 'rose0\x00', {}, {}, 0x2e, 0x40, 0x4, 0x1}, 0x0, 0x138, 0x180, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x7ff, 0x0, 0x1, [0x100, 0x1f, 0xad6d, 0x7, 0x40, 0x8, 0x9, 0x7, 0x7, 0x8, 0x0, 0x400, 0x446, 0xc4b1, 0x7ff, 0x5c], 0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@empty, @ipv4=@rand_addr=0xffffffff, 0x15, 0x38, 0x6}}}, {{@ipv6={@ipv4={[], [], @multicast1}, @mcast1, [0x4bd658962f34041a, 0x1ff000100, 0xffffffff, 0x17ffffeff], [0x0, 0x7fffffff, 0xffffff00, 0xff000000], 'bridge0\x00', 'bridge_slave_1\x00', {}, {0xdaf21f676f55d979}, 0x73, 0x1, 0x2, 0x8e55493c25688d71}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x9}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@loopback, @ipv4=@rand_addr=0xffffffff, 0x12, 0x13, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x738) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r4, 0x0, 0xa808) r5 = accept4$inet(0xffffffffffffffff, &(0x7f0000000380)={0x2, 0x0, @remote}, &(0x7f00000003c0)=0x10, 0x800) fcntl$setstatus(r5, 0x4, 0x2000) r6 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r6, &(0x7f0000000480), 0x10000000000002a1, 0x0) getdents64(r6, &(0x7f0000000040)=""/19, 0x13) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) r7 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r7, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="04070000000000000000e4ff330000003a57d516cf85d57a"], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r8 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x400, 0x0) futimesat(r8, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={{0x0, 0x7530}, {0x77359400}}) 12:17:18 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}], 0x3, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000080)=0xb8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r5, &(0x7f0000000480), 0x10000000000002a1, 0x0) preadv(r5, &(0x7f0000000080), 0x189, 0x0) renameat(r2, &(0x7f0000000000)='./file1\x00', r4, &(0x7f0000000040)='./file1\x00') sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VT_WAITACTIVE(r4, 0x5607) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x73f07b8639d6906c) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x55faa7e44e24db57) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$TCFLSH(r0, 0x540b, 0xffffffffffff0001) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) r2 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) dup(r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r4, 0x0, 0xa808) r5 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r5, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:19 executing program 1: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x5090000, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) socket$inet6(0xa, 0x802, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="280000000000000000000000ea6cd79ac0f74591000000000000000000000007000000"], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000800)=""/4096) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:17:19 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}], 0x3, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x408400, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x8000, 0x0) r4 = accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f0000000100)=0x32378b60aa58a8be, 0x800) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r5, 0x0) r6 = dup2(r4, r5) connect$inet6(r1, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) write$P9_RREADDIR(r6, &(0x7f0000000280)={0x68, 0x29, 0x2, {0xf1c, [{{0x10, 0x3, 0x2}, 0x3, 0x62, 0x7, './file1'}, {{0x7, 0x3, 0x5}, 0x5, 0x5, 0x7, './file1'}, {{0xdc, 0x2, 0x6}, 0x800, 0x5, 0x7, './file1'}]}}, 0x68) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r7) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x0, &(0x7f0000005780)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x005t\xea\xdca$\r\x01\xf4\x10\xfd\xf0\xcc*\xf3r!\x04\xe5\xc1@\xf8\xee\xe2\xab\xe2\xc7s\x04\xc1y\xe7\f\x9a\x7f\xd9\xb2\xfb\x03\xf0\xe6\xc3O\x1ai\xa6\xc0\xfd\x9f\x8b\x13\f\x13M\xaf\xf1\xd0\x81Z?F\xfbM-^a\'\xed\xfe\xcc\x9b_\x83\x99f\x93C\x8f\'g\xaeq\x92GFu[\xf5\xd5\xf0\x924(\xe1\xdc\x81\x86C\x7f\xb1\xc4\xfb\xb3e\xa4\x94\xfcYI\x03\xaf\x19\x9bp9-PG\xe5\xf8{v\xe0\xbb\xe4\xef[\x9b\xc3\v\xc6;4\x18\xbb\x83\xdc\x13q\t`\xf1X!\xf5\xb9\xdc\xf6 \xc4\x04\xbe\x14\x16DI\xa1<\x97\xecb\'>f\x8c\xd0\xb0e', 0x1, 0xc3, &(0x7f0000000240)=""/195, 0x0, 0x0, [], r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, 0x0}, 0x70) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, r8}, 0x14) r9 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r9, 0x0, 0xa808) r10 = openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x40, 0x2) pwritev(r10, &(0x7f00000006c0)=[{&(0x7f0000000380)="b3f166695a4e981c784fac2601f00608ac0336f1e6c4797fc571fcd195046b272917a8b77f434428a11a2d3478152443374c8c054b8c883adcaf495c3afc7bf7b22f49e85032739f69c769012db18080c62a2f2dc1f663cdedff6efc885f3f0f99ef05ebe90a83e5c266ba036ded2e0d91cfdd440e1aec87e26cefbb8c611c6e120e73cc42e8d1e907bc4c6e6d2e21535f", 0x91}, {&(0x7f0000000600)="2a3f5253cb2e3723bec4f8b651f565c73113dc308b60c2f3e7ef197ac7fc5da6e8eb10317c8d6025c92893fd48ad0b85d660ac3c0b1383b16ab50cf814fa1788abefaac2a6911d3615e3532336ea452df80706f74b4faad9b04d18f1bda8179becea9f", 0x63}, {&(0x7f0000000800)="6fba46fc9f20ad27780442c1a9947bd4835d2b78cdbab9141fcc8bf0456938c5fa3c8c3113a0caa1e45d3f7efa7fb2f11f83a1e0bf0f77e074ffe9131bc0258f0471b10b5def5a7a5e205b18eb10c10cce55f045569d96343e3e84bde964172c9bdc8275cc60092cd58b7772cd8836", 0x6f}], 0x3, 0x0) r11 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r11, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="280000000000000000000000000000008ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f000000100000000000000000000000076289d3913b9e000000"], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:17:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r4, &(0x7f0000000480), 0x10000000000002a1, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r5, &(0x7f0000000480), 0x10000000000002a1, 0x0) sendmmsg$inet6(r5, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000000)={@val={0x0, 0x9200}, @val={0x2, 0x15f9e2879175c9a0, 0x7, 0x20, 0x81, 0x2}, @llc={@llc={0x4e, 0xb7, "d7", "6a21bbd1034cacd103514d04cae86dbc89ad72845834453716812398dc3320a9f0fff55d3448540d810297a3460c30d3f93b9f8f72dbd098798680721d5d54bc006e32f5cbdc5ac7805b98090d314448d1cbd4da4c3fb5bcc71fb86cf02ecedea154ae604cc0ad78d826a0077ef59ff1b405ee9d44b58e32534d0c976c7ade5a472ab4adc488a5e6c50cff4fcf3af7"}}}, 0xa0) 12:17:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x17}, 0x10001}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r2, 0x80003) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000b80)={0x0, 0x0}, &(0x7f0000000bc0)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@dev={0xfe, 0x80, [], 0x15}, @in6=@ipv4={[], [], @local}, 0x4e20, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20, 0x0, 0x0, r4}, {0xb, 0x0, 0x0, 0x0, 0x3, 0x0, 0x401}, {0x0, 0x0, 0x7}, 0x0, 0x0, 0x1, 0x1}, {{@in=@local, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x12000, 0x0, 0x3, 0x2, 0x0, 0x0, 0x1f}}, 0xe8) r5 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r5, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) setsockopt$inet6_MCAST_LEAVE_GROUP(r5, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x17}, 0x10001}}}, 0x88) getsockopt$inet6_buf(r5, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r6, 0x80003) sendfile(r5, r6, &(0x7f00000000c0), 0x8000fffffffe) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000b80)={0x0, 0x0}, &(0x7f0000000bc0)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@dev={0xfe, 0x80, [], 0x15}, @in6=@ipv4={[], [], @local}, 0x4e20, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20, 0x0, 0x0, r8}, {0xb, 0x0, 0x0, 0x0, 0x3, 0x0, 0x401}, {0x0, 0x0, 0x7}, 0x0, 0x0, 0x1, 0x1}, {{@in=@local, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x12000, 0x0, 0x3, 0x2, 0x0, 0x0, 0x1f}}, 0xe8) stat(&(0x7f0000000080)='./file1\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r10, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r10, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) setsockopt$inet6_MCAST_LEAVE_GROUP(r10, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x17}, 0x10001}}}, 0x88) getsockopt$inet6_buf(r10, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r10, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r11 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r10, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r11, 0x80003) sendfile(r10, r11, &(0x7f00000000c0), 0x8000fffffffe) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r12, r12) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000b80)={0x0, 0x0}, &(0x7f0000000bc0)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r10, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@dev={0xfe, 0x80, [], 0x15}, @in6=@ipv4={[], [], @local}, 0x4e20, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20, 0x0, 0x0, r13}, {0xb, 0x0, 0x0, 0x0, 0x3, 0x0, 0x401}, {0x0, 0x0, 0x7}, 0x0, 0x0, 0x1, 0x1}, {{@in=@local, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x12000, 0x0, 0x3, 0x2, 0x0, 0x0, 0x1f}}, 0xe8) r14 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r14, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r14, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) setsockopt$inet6_MCAST_LEAVE_GROUP(r14, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x17}, 0x10001}}}, 0x88) getsockopt$inet6_buf(r14, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r14, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r15 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r14, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r15, 0x80003) sendfile(r14, r15, &(0x7f00000000c0), 0x8000fffffffe) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r16, r16) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000000b80)={0x0, 0x0}, &(0x7f0000000bc0)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r14, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@dev={0xfe, 0x80, [], 0x15}, @in6=@ipv4={[], [], @local}, 0x4e20, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20, 0x0, 0x0, r17}, {0xb, 0x0, 0x0, 0x0, 0x3, 0x0, 0x401}, {0x0, 0x0, 0x7}, 0x0, 0x0, 0x1, 0x1}, {{@in=@local, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x12000, 0x0, 0x3, 0x2, 0x0, 0x0, 0x1f}}, 0xe8) r18 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r18, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r18, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) setsockopt$inet6_MCAST_LEAVE_GROUP(r18, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x17}, 0x10001}}}, 0x88) getsockopt$inet6_buf(r18, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r18, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r19 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r18, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r19, 0x80003) sendfile(r18, r19, &(0x7f00000000c0), 0x8000fffffffe) r20 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r20, r20) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000b80)={0x0, 0x0}, &(0x7f0000000bc0)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r18, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@dev={0xfe, 0x80, [], 0x15}, @in6=@ipv4={[], [], @local}, 0x4e20, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20, 0x0, 0x0, r21}, {0xb, 0x0, 0x0, 0x0, 0x3, 0x0, 0x401}, {0x0, 0x0, 0x7}, 0x0, 0x0, 0x1, 0x1}, {{@in=@local, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x12000, 0x0, 0x3, 0x2, 0x0, 0x0, 0x1f}}, 0xe8) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000300), &(0x7f0000000340)) r24 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r24, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r24, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) setsockopt$inet6_MCAST_LEAVE_GROUP(r24, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x17}, 0x10001}}}, 0x88) getsockopt$inet6_buf(r24, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r24, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r25 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r24, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r25, 0x80003) sendfile(r24, r25, &(0x7f00000000c0), 0x8000fffffffe) r26 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r26, r26) getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000000b80)={0x0, 0x0}, &(0x7f0000000bc0)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r24, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@dev={0xfe, 0x80, [], 0x15}, @in6=@ipv4={[], [], @local}, 0x4e20, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20, 0x0, 0x0, r27}, {0xb, 0x0, 0x0, 0x0, 0x3, 0x0, 0x401}, {0x0, 0x0, 0x7}, 0x0, 0x0, 0x1, 0x1}, {{@in=@local, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x12000, 0x0, 0x3, 0x2, 0x0, 0x0, 0x1f}}, 0xe8) r28 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r28, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) fchown(r28, 0x0, r29) r30 = getegid() lstat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r32 = getgid() r33 = getegid() r34 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r34, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) fchown(r34, 0x0, r35) r36 = getgid() setxattr$system_posix_acl(&(0x7f0000000000)='\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x8, r4}, {0x2, 0x6, r8}, {0x2, 0x4, 0xee00}, {0x2, 0x4, r9}, {0x2, 0x1, r13}, {0x2, 0x6, r17}, {0x2, 0x2, r21}, {0x2, 0x4, r22}, {0x2, 0x4, r23}, {0x2, 0x4, r27}], {0x4, 0x4}, [{0x8, 0x4, r29}, {0x8, 0x2}, {0x8, 0x9, r30}, {0x8, 0x2, r31}, {0x8, 0x7, r32}, {0x8, 0x1, r33}, {0x8, 0x0, r35}, {0x8, 0x1, r36}], {0x10, 0x4}, {0x20, 0x1}}, 0xb4, 0x2) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r37 = socket$inet6(0xa, 0x2, 0x7f) connect$inet6(r37, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r38) r39 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r37, r39, 0x0, 0xa808) r40 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r40, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:17:20 executing program 3: open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {&(0x7f0000000380)="c1bb4932ef50741c243a2d7c45d8b28f59b7b0493fb377517ce8b07c523ffdd085c9f55187b9fe82077146080878df1212e44ce3a3ffc28c345d86109586d9351d533fa2df1026c6c6c3538e1a0f26cac310d702d30322b6c345037d57c5e1c303e0f858e20475574fb1d54b9ef5d82745061483f73606d4574a12701efdcc5498aff5929ad047f921be5146780004652f5edfe0e6d047f60aa8fabdfb95b8af9e00cb8c920a35966eeb777e4ee8308d860fb5d9001054a997ac1c4e1470f76d", 0xc0}, {&(0x7f0000000480)="6ee589e3bf389fb10da34f07ff37077f1ba56a1410ba7042c469ad65466cd164e5305a7bcab901ab8d350dcd6a2b5b7076274220bf73b5c9c7d8148c443e35e3acfe8a68f6560fa16e857cac68b98a47cd71977c3c374ba78e", 0x59}], 0x3, &(0x7f0000000500)=[{0x60, 0x0, 0x6a8, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f47eaa2446341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc"}, {0x90, 0x10f, 0x7, "8d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc0461ef011c107d001de57b2a51e45c9e039dd7c27f65ba46299dc96cfe6e257852dc35ff594f26f699444f45e198"}, {0x90, 0x3a, 0x5, "0863b374e918f3324884d59a27c58631d4f00cd9cb8286996478b035932bf4dfe5815e30e0c9bc2e61fca265cc7d5e8fa00104c91997c7c78d9cfb315271408545fdff68c810c33ce24234c73091dad3e13d9a1873f40e86d899114124606f1e15d84ddb2955eefdb29760f1d7e420be876ddb360b1c0691042c41129606"}], 0x180}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r6, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) splice(r6, &(0x7f0000000840), r4, &(0x7f0000000880), 0x3, 0xc) write(r5, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) [ 1288.160263] INFO: task syz-executor.4:1827 blocked for more than 140 seconds. [ 1288.167589] Not tainted 4.14.150+ #0 [ 1288.172777] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1288.180779] syz-executor.4 D28480 1827 1783 0x80000004 [ 1288.186413] Call Trace: [ 1288.189010] ? __schedule+0x88c/0x1f80 [ 1288.196620] ? ___preempt_schedule+0x16/0x18 [ 1288.201077] ? __sched_text_start+0x8/0x8 [ 1288.205228] ? mark_held_locks+0xa6/0xf0 [ 1288.209289] ? rwsem_down_write_failed+0x3e9/0x7c0 [ 1288.214566] schedule+0x92/0x1c0 [ 1288.217934] rwsem_down_write_failed+0x3ee/0x7c0 [ 1288.222954] ? rwsem_down_read_failed_killable+0x5c0/0x5c0 [ 1288.228579] ? perf_trace_lock_acquire+0x122/0x4e0 [ 1288.233781] ? debug_object_activate+0x4f0/0x4f0 [ 1288.238544] ? HARDIRQ_verbose+0x10/0x10 [ 1288.242944] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1288.248401] ? ___pmd_free_tlb+0x9e/0x110 [ 1288.252821] call_rwsem_down_write_failed+0x13/0x20 [ 1288.257844] down_write+0x4f/0x90 [ 1288.261518] ? unlink_file_vma+0x6e/0xa0 [ 1288.265578] unlink_file_vma+0x6e/0xa0 [ 1288.269464] free_pgtables+0x78/0x1c0 [ 1288.273521] exit_mmap+0x222/0x440 [ 1288.277063] ? SyS_munmap+0x30/0x30 [ 1288.280916] ? exit_aio+0x264/0x340 [ 1288.284541] ? reacquire_held_locks+0xb5/0x3f0 [ 1288.289160] mmput+0xeb/0x370 [ 1288.292549] do_exit+0x905/0x2a20 [ 1288.295998] ? noop_count+0x31/0x40 [ 1288.299630] ? HARDIRQ_verbose+0x10/0x10 [ 1288.304689] ? mm_update_next_owner+0x610/0x610 [ 1288.309367] ? get_signal+0x334/0x1cc0 [ 1288.313571] ? lock_downgrade+0x630/0x630 [ 1288.317713] ? lock_acquire+0x12b/0x360 [ 1288.321917] ? get_signal+0x1e7/0x1cc0 [ 1288.325811] do_group_exit+0x100/0x2e0 [ 1288.329696] get_signal+0x39f/0x1cc0 [ 1288.333661] ? wait_consider_task+0x3150/0x3150 [ 1288.338333] ? __handle_mm_fault+0x821/0x2700 [ 1288.343063] do_signal+0x96/0x15d0 [ 1288.346601] ? SyS_waitid+0x290/0x290 [ 1288.350629] ? task_stopped_code+0x140/0x140 [ 1288.355039] ? setup_sigcontext+0x810/0x810 [ 1288.359377] ? kernel_wait4+0x210/0x210 [ 1288.363591] ? __do_page_fault+0x49f/0xbb0 [ 1288.367829] ? lock_downgrade+0x630/0x630 [ 1288.372311] ? exit_to_usermode_loop+0xcd/0x160 [ 1288.376985] exit_to_usermode_loop+0x11d/0x160 [ 1288.381793] do_syscall_64+0x3a3/0x520 [ 1288.385688] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1288.391103] RIP: 0033:0x413d7a [ 1288.394294] RSP: 002b:00007fffc9e8ae88 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 1288.402233] RAX: fffffffffffffe00 RBX: 000000000000072b RCX: 0000000000413d7a [ 1288.409497] RDX: 0000000040000000 RSI: 00007fffc9e8ae94 RDI: ffffffffffffffff [ 1288.417007] RBP: 00000000000000f8 R08: 0000000000000723 R09: 0000000001e23940 [ 1288.424315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000415a40 [ 1288.432597] R13: 00007fffc9e8b118 R14: 0000000000000000 R15: 0000000000000000 [ 1288.440563] INFO: task syz-executor.1:9053 blocked for more than 140 seconds. [ 1288.447835] Not tainted 4.14.150+ #0 [ 1288.452282] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1288.460264] syz-executor.1 D28480 9053 3093 0x80000004 [ 1288.465894] Call Trace: [ 1288.468488] ? __schedule+0x88c/0x1f80 [ 1288.472723] ? ___preempt_schedule+0x16/0x18 [ 1288.477142] ? __sched_text_start+0x8/0x8 [ 1288.481530] ? mark_held_locks+0xa6/0xf0 [ 1288.485595] ? rwsem_down_write_failed+0x3e9/0x7c0 [ 1288.490736] schedule+0x92/0x1c0 [ 1288.494102] rwsem_down_write_failed+0x3ee/0x7c0 [ 1288.498865] ? rwsem_down_read_failed_killable+0x5c0/0x5c0 [ 1288.504724] ? perf_trace_lock_acquire+0x122/0x4e0 [ 1288.509651] ? debug_object_activate+0x4f0/0x4f0 [ 1288.514640] ? HARDIRQ_verbose+0x10/0x10 [ 1288.518696] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1288.524370] ? ___pmd_free_tlb+0x9e/0x110 [ 1288.528540] call_rwsem_down_write_failed+0x13/0x20 [ 1288.533788] down_write+0x4f/0x90 [ 1288.537240] ? unlink_file_vma+0x6e/0xa0 [ 1288.541519] unlink_file_vma+0x6e/0xa0 [ 1288.545408] free_pgtables+0x78/0x1c0 [ 1288.549212] exit_mmap+0x222/0x440 [ 1288.552998] ? SyS_munmap+0x30/0x30 [ 1288.556631] ? exit_aio+0x264/0x340 [ 1288.561298] ? reacquire_held_locks+0xb5/0x3f0 [ 1288.565932] mmput+0xeb/0x370 [ 1288.569035] do_exit+0x905/0x2a20 [ 1288.572719] ? noop_count+0x31/0x40 [ 1288.576356] ? HARDIRQ_verbose+0x10/0x10 [ 1288.580628] ? mm_update_next_owner+0x610/0x610 [ 1288.585303] ? get_signal+0x334/0x1cc0 [ 1288.589187] ? lock_downgrade+0x630/0x630 [ 1288.593567] ? lock_acquire+0x12b/0x360 [ 1288.597541] ? get_signal+0x1e7/0x1cc0 [ 1288.601730] do_group_exit+0x100/0x2e0 [ 1288.605625] get_signal+0x39f/0x1cc0 [ 1288.609341] ? wait_consider_task+0x3150/0x3150 [ 1288.614255] ? __handle_mm_fault+0x821/0x2700 [ 1288.618764] do_signal+0x96/0x15d0 [ 1288.622533] ? SyS_waitid+0x290/0x290 [ 1288.626337] ? task_stopped_code+0x140/0x140 [ 1288.630962] ? setup_sigcontext+0x810/0x810 [ 1288.635287] ? HARDIRQ_verbose+0x10/0x10 [ 1288.639341] ? HARDIRQ_verbose+0x10/0x10 [ 1288.643653] ? kernel_wait4+0x210/0x210 [ 1288.647631] ? __do_page_fault+0x49f/0xbb0 [ 1288.652093] ? lock_downgrade+0x630/0x630 [ 1288.656259] ? exit_to_usermode_loop+0xcd/0x160 [ 1288.661156] exit_to_usermode_loop+0x11d/0x160 [ 1288.665745] do_syscall_64+0x3a3/0x520 [ 1288.669637] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1288.675057] RIP: 0033:0x413d7a [ 1288.678245] RSP: 002b:00007ffdaf9f2598 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 1288.686222] RAX: fffffffffffffe00 RBX: 000000000000235e RCX: 0000000000413d7a [ 1288.694268] RDX: 0000000040000000 RSI: 00007ffdaf9f25a4 RDI: ffffffffffffffff [ 1288.701851] RBP: 00000000000000f8 R08: 000000000000235d R09: 0000000002753940 [ 1288.709121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000415a40 [ 1288.716634] R13: 00007ffdaf9f2828 R14: 0000000000000000 R15: 0000000000000000 [ 1288.723959] INFO: task syz-executor.0:9923 blocked for more than 140 seconds. [ 1288.731456] Not tainted 4.14.150+ #0 [ 1288.735686] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1288.743854] syz-executor.0 D27840 9923 3093 0x80000004 [ 1288.749491] Call Trace: [ 1288.752313] ? __schedule+0x88c/0x1f80 [ 1288.756196] ? ___preempt_schedule+0x16/0x18 [ 1288.760824] ? __sched_text_start+0x8/0x8 [ 1288.764977] ? mark_held_locks+0xa6/0xf0 [ 1288.769039] ? rwsem_down_write_failed+0x3e9/0x7c0 [ 1288.774199] schedule+0x92/0x1c0 [ 1288.777568] rwsem_down_write_failed+0x3ee/0x7c0 [ 1288.782547] ? rwsem_down_read_failed_killable+0x5c0/0x5c0 [ 1288.788172] ? perf_trace_lock_acquire+0x122/0x4e0 [ 1288.793335] ? debug_object_activate+0x4f0/0x4f0 [ 1288.798098] ? HARDIRQ_verbose+0x10/0x10 [ 1288.802378] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1288.807824] ? ___pmd_free_tlb+0x9e/0x110 [ 1288.812315] call_rwsem_down_write_failed+0x13/0x20 [ 1288.817528] down_write+0x4f/0x90 [ 1288.822001] ? unlink_file_vma+0x6e/0xa0 [ 1288.826064] unlink_file_vma+0x6e/0xa0 [ 1288.829950] free_pgtables+0x78/0x1c0 [ 1288.834068] exit_mmap+0x222/0x440 [ 1288.837608] ? SyS_munmap+0x30/0x30 [ 1288.841458] ? exit_aio+0x264/0x340 [ 1288.845081] ? reacquire_held_locks+0xb5/0x3f0 [ 1288.849718] mmput+0xeb/0x370 [ 1288.853093] do_exit+0x905/0x2a20 [ 1288.856542] ? noop_count+0x31/0x40 [ 1288.860389] ? HARDIRQ_verbose+0x10/0x10 [ 1288.864452] ? mm_update_next_owner+0x610/0x610 [ 1288.869123] ? get_signal+0x334/0x1cc0 [ 1288.873265] ? lock_downgrade+0x630/0x630 [ 1288.877409] ? lock_acquire+0x12b/0x360 [ 1288.881600] ? get_signal+0x1e7/0x1cc0 [ 1288.885493] do_group_exit+0x100/0x2e0 [ 1288.889381] get_signal+0x39f/0x1cc0 [ 1288.893340] ? wait_consider_task+0x3150/0x3150 [ 1288.898007] ? __handle_mm_fault+0x821/0x2700 [ 1288.902730] do_signal+0x96/0x15d0 [ 1288.906272] ? SyS_waitid+0x290/0x290 [ 1288.910292] ? task_stopped_code+0x140/0x140 [ 1288.914697] ? setup_sigcontext+0x810/0x810 [ 1288.919011] ? HARDIRQ_verbose+0x10/0x10 [ 1288.923301] ? HARDIRQ_verbose+0x10/0x10 [ 1288.927375] ? kernel_wait4+0x210/0x210 [ 1288.931647] ? __do_page_fault+0x49f/0xbb0 [ 1288.935883] ? lock_downgrade+0x630/0x630 [ 1288.940293] ? exit_to_usermode_loop+0xcd/0x160 [ 1288.944967] exit_to_usermode_loop+0x11d/0x160 [ 1288.949555] do_syscall_64+0x3a3/0x520 [ 1288.954433] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1288.959618] RIP: 0033:0x413d7a [ 1288.963016] RSP: 002b:00007ffcc7913958 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 1288.970749] RAX: fffffffffffffe00 RBX: 00000000000026c4 RCX: 0000000000413d7a [ 1288.978013] RDX: 0000000040000000 RSI: 00007ffcc7913964 RDI: ffffffffffffffff [ 1288.985543] RBP: 00000000000000f8 R08: 00000000000026c3 R09: 000000000238f940 [ 1288.992833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000415a40 [ 1289.000353] R13: 00007ffcc7913be8 R14: 0000000000000000 R15: 0000000000000000 [ 1289.007660] INFO: task syz-executor.3:10677 blocked for more than 140 seconds. [ 1289.015275] Not tainted 4.14.150+ #0 [ 1289.019503] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1289.027673] syz-executor.3 D27840 10677 3093 0x80000004 [ 1289.033333] Call Trace: [ 1289.035930] ? __schedule+0x88c/0x1f80 [ 1289.039811] ? ___preempt_schedule+0x16/0x18 [ 1289.044512] ? __sched_text_start+0x8/0x8 [ 1289.048665] ? mark_held_locks+0xa6/0xf0 [ 1289.052975] ? rwsem_down_write_failed+0x3e9/0x7c0 [ 1289.057903] schedule+0x92/0x1c0 [ 1289.061615] rwsem_down_write_failed+0x3ee/0x7c0 [ 1289.066385] ? rwsem_down_read_failed_killable+0x5c0/0x5c0 [ 1289.072273] ? perf_trace_lock_acquire+0x122/0x4e0 [ 1289.077212] ? debug_object_activate+0x4f0/0x4f0 [ 1289.082959] ? HARDIRQ_verbose+0x10/0x10 [ 1289.087144] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1289.092905] ? ___pmd_free_tlb+0x9e/0x110 [ 1289.097082] call_rwsem_down_write_failed+0x13/0x20 [ 1289.102362] down_write+0x4f/0x90 [ 1289.105813] ? unlink_file_vma+0x6e/0xa0 [ 1289.109868] unlink_file_vma+0x6e/0xa0 [ 1289.114021] free_pgtables+0x78/0x1c0 [ 1289.117840] exit_mmap+0x222/0x440 [ 1289.121649] ? SyS_munmap+0x30/0x30 [ 1289.125281] ? exit_aio+0x264/0x340 [ 1289.128902] ? reacquire_held_locks+0xb5/0x3f0 [ 1289.133791] mmput+0xeb/0x370 [ 1289.136903] do_exit+0x905/0x2a20 [ 1289.140574] ? noop_count+0x31/0x40 [ 1289.144206] ? HARDIRQ_verbose+0x10/0x10 [ 1289.148261] ? mm_update_next_owner+0x610/0x610 [ 1289.153268] ? get_signal+0x334/0x1cc0 [ 1289.157163] ? lock_downgrade+0x630/0x630 [ 1289.161616] ? lock_acquire+0x12b/0x360 [ 1289.165592] ? get_signal+0x1e7/0x1cc0 [ 1289.169486] do_group_exit+0x100/0x2e0 [ 1289.173622] get_signal+0x39f/0x1cc0 [ 1289.177348] ? wait_consider_task+0x3150/0x3150 [ 1289.182233] ? __handle_mm_fault+0x821/0x2700 [ 1289.186741] do_signal+0x96/0x15d0 [ 1289.190504] ? SyS_waitid+0x290/0x290 [ 1289.194316] ? task_stopped_code+0x140/0x140 [ 1289.198721] ? setup_sigcontext+0x810/0x810 [ 1289.203285] ? HARDIRQ_verbose+0x10/0x10 [ 1289.207347] ? HARDIRQ_verbose+0x10/0x10 [ 1289.212387] ? kernel_wait4+0x210/0x210 [ 1289.216358] ? __do_page_fault+0x49f/0xbb0 [ 1289.220804] ? lock_downgrade+0x630/0x630 [ 1289.224968] ? exit_to_usermode_loop+0xcd/0x160 [ 1289.229637] exit_to_usermode_loop+0x11d/0x160 [ 1289.234466] do_syscall_64+0x3a3/0x520 [ 1289.238361] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1289.243764] RIP: 0033:0x413d7a [ 1289.246952] RSP: 002b:00007ffdf22bb708 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 1289.254886] RAX: fffffffffffffe00 RBX: 00000000000029b6 RCX: 0000000000413d7a [ 1289.262173] RDX: 0000000040000000 RSI: 00007ffdf22bb714 RDI: ffffffffffffffff [ 1289.269436] RBP: 00000000000000f8 R08: 00000000000029b5 R09: 00000000026fe940 [ 1289.276951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000415a40 [ 1289.284239] R13: 00007ffdf22bb998 R14: 0000000000000000 R15: 0000000000000000 [ 1289.291900] INFO: task syz-executor.3:10678 blocked for more than 140 seconds. [ 1289.299254] Not tainted 4.14.150+ #0 [ 1289.303686] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1289.311673] syz-executor.3 D25280 10678 10677 0x00000000 [ 1289.317307] Call Trace: [ 1289.319899] ? __schedule+0x88c/0x1f80 [ 1289.324037] ? ___preempt_schedule+0x16/0x18 [ 1289.328456] ? __sched_text_start+0x8/0x8 [ 1289.332842] ? mark_held_locks+0xa6/0xf0 [ 1289.336914] ? rwsem_down_write_failed+0x3e9/0x7c0 [ 1289.342823] schedule+0x92/0x1c0 [ 1289.346191] rwsem_down_write_failed+0x3ee/0x7c0 [ 1289.351177] ? rwsem_down_read_failed_killable+0x5c0/0x5c0 [ 1289.356799] ? perf_trace_lock_acquire+0x122/0x4e0 [ 1289.361950] ? HARDIRQ_verbose+0x10/0x10 [ 1289.366024] ? fs_reclaim_acquire+0x10/0x10 [ 1289.370583] call_rwsem_down_write_failed+0x13/0x20 [ 1289.375607] down_write+0x4f/0x90 [ 1289.379052] ? copy_process.part.0+0x246a/0x66c0 [ 1289.384026] copy_process.part.0+0x246a/0x66c0 [ 1289.388650] ? __cleanup_sighand+0x50/0x50 [ 1289.393164] ? lock_acquire+0x12b/0x360 [ 1289.397136] ? __might_fault+0xd4/0x1b0 [ 1289.401342] _do_fork+0x197/0xce0 [ 1289.404813] ? fork_idle+0x260/0x260 [ 1289.408531] ? SyS_clock_gettime+0x7d/0xe0 [ 1289.412998] ? do_clock_gettime+0xd0/0xd0 [ 1289.417144] ? do_syscall_64+0x43/0x520 [ 1289.421333] ? sys_vfork+0x20/0x20 [ 1289.424873] do_syscall_64+0x19b/0x520 [ 1289.428762] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1289.434169] RIP: 0033:0x45850a [ 1289.437353] RSP: 002b:00007ffdf22bb4e0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1289.445290] RAX: ffffffffffffffda RBX: 00007ffdf22bb4e0 RCX: 000000000045850a [ 1289.453799] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1289.461405] RBP: 00007ffdf22bb520 R08: 0000000000000001 R09: 00000000026fe940 [ 1289.468675] R10: 00000000026fec10 R11: 0000000000000246 R12: 0000000000000001 [ 1289.476951] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffdf22bb570 [ 1289.484287] INFO: task syz-executor.2:12507 blocked for more than 140 seconds. [ 1289.491868] Not tainted 4.14.150+ #0 [ 1289.496100] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1289.504257] syz-executor.2 D28480 12507 1793 0x80000004 [ 1289.509923] Call Trace: [ 1289.512753] ? __schedule+0x88c/0x1f80 [ 1289.516640] ? ___preempt_schedule+0x16/0x18 [ 1289.521267] ? __sched_text_start+0x8/0x8 [ 1289.525419] ? mark_held_locks+0xa6/0xf0 [ 1289.529477] ? rwsem_down_write_failed+0x3e9/0x7c0 [ 1289.534708] schedule+0x92/0x1c0 [ 1289.538080] rwsem_down_write_failed+0x3ee/0x7c0 [ 1289.543088] ? rwsem_down_read_failed_killable+0x5c0/0x5c0 [ 1289.548716] ? perf_trace_lock_acquire+0x122/0x4e0 [ 1289.553861] ? debug_object_activate+0x4f0/0x4f0 [ 1289.558623] ? HARDIRQ_verbose+0x10/0x10 [ 1289.562971] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1289.568426] ? ___pmd_free_tlb+0x9e/0x110 [ 1289.572818] call_rwsem_down_write_failed+0x13/0x20 [ 1289.577841] down_write+0x4f/0x90 [ 1289.581508] ? unlink_file_vma+0x6e/0xa0 [ 1289.585569] unlink_file_vma+0x6e/0xa0 [ 1289.589454] free_pgtables+0x78/0x1c0 [ 1289.593510] exit_mmap+0x222/0x440 [ 1289.597047] ? SyS_munmap+0x30/0x30 [ 1289.601636] ? exit_aio+0x264/0x340 [ 1289.605258] ? reacquire_held_locks+0xb5/0x3f0 [ 1289.609876] mmput+0xeb/0x370 [ 1289.613215] do_exit+0x905/0x2a20 [ 1289.616666] ? noop_count+0x31/0x40 [ 1289.620517] ? HARDIRQ_verbose+0x10/0x10 [ 1289.624579] ? mm_update_next_owner+0x610/0x610 [ 1289.629248] ? get_signal+0x334/0x1cc0 [ 1289.633464] ? lock_downgrade+0x630/0x630 [ 1289.637609] ? lock_acquire+0x12b/0x360 [ 1289.641795] ? get_signal+0x1e7/0x1cc0 [ 1289.645689] do_group_exit+0x100/0x2e0 [ 1289.649575] get_signal+0x39f/0x1cc0 [ 1289.653519] ? wait_consider_task+0x3150/0x3150 [ 1289.658189] ? __handle_mm_fault+0x821/0x2700 [ 1289.662907] do_signal+0x96/0x15d0 [ 1289.666443] ? SyS_waitid+0x290/0x290 [ 1289.670454] ? task_stopped_code+0x140/0x140 [ 1289.674857] ? setup_sigcontext+0x810/0x810 [ 1289.679173] ? HARDIRQ_verbose+0x10/0x10 [ 1289.683462] ? HARDIRQ_verbose+0x10/0x10 [ 1289.687533] ? kernel_wait4+0x210/0x210 [ 1289.691725] ? __do_page_fault+0x49f/0xbb0 [ 1289.695956] ? lock_downgrade+0x630/0x630 [ 1289.700355] ? exit_to_usermode_loop+0xcd/0x160 [ 1289.705028] exit_to_usermode_loop+0x11d/0x160 [ 1289.709609] do_syscall_64+0x3a3/0x520 [ 1289.713737] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1289.718918] RIP: 0033:0x413d7a [ 1289.722337] RSP: 002b:00007ffc0154a008 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 1289.730823] RAX: fffffffffffffe00 RBX: 00000000000030dc RCX: 0000000000413d7a [ 1289.738085] RDX: 0000000040000000 RSI: 00007ffc0154a014 RDI: ffffffffffffffff [ 1289.745629] RBP: 00000000000000f8 R08: 00000000000030db R09: 0000000002588940 [ 1289.752923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000415a40 [ 1289.760507] R13: 00007ffc0154a298 R14: 0000000000000000 R15: 0000000000000000 [ 1289.767995] INFO: task syz-executor.5:15018 blocked for more than 140 seconds. [ 1289.775589] Not tainted 4.14.150+ #0 [ 1289.779813] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1289.787974] syz-executor.5 D27840 15018 1783 0x80000004 [ 1289.793633] Call Trace: [ 1289.796231] ? __schedule+0x88c/0x1f80 [ 1289.800355] ? ___preempt_schedule+0x16/0x18 [ 1289.804772] ? __sched_text_start+0x8/0x8 [ 1289.808917] ? mark_held_locks+0xa6/0xf0 [ 1289.813300] ? rwsem_down_write_failed+0x3e9/0x7c0 [ 1289.818451] schedule+0x92/0x1c0 [ 1289.822108] rwsem_down_write_failed+0x3ee/0x7c0 [ 1289.826879] ? rwsem_down_read_failed_killable+0x5c0/0x5c0 [ 1289.832723] ? perf_trace_lock_acquire+0x122/0x4e0 [ 1289.837648] ? debug_object_activate+0x4f0/0x4f0 [ 1289.842626] ? HARDIRQ_verbose+0x10/0x10 [ 1289.846682] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1289.852384] ? ___pmd_free_tlb+0x9e/0x110 [ 1289.856551] call_rwsem_down_write_failed+0x13/0x20 [ 1289.862691] down_write+0x4f/0x90 [ 1289.866152] ? unlink_file_vma+0x6e/0xa0 [ 1289.870444] unlink_file_vma+0x6e/0xa0 [ 1289.874337] free_pgtables+0x78/0x1c0 [ 1289.878145] exit_mmap+0x222/0x440 [ 1289.881950] ? SyS_munmap+0x30/0x30 [ 1289.885576] ? exit_aio+0x264/0x340 [ 1289.889198] ? reacquire_held_locks+0xb5/0x3f0 [ 1289.894059] mmput+0xeb/0x370 [ 1289.897168] do_exit+0x905/0x2a20 [ 1289.900834] ? noop_count+0x31/0x40 [ 1289.904467] ? HARDIRQ_verbose+0x10/0x10 [ 1289.908528] ? mm_update_next_owner+0x610/0x610 [ 1289.913455] ? get_signal+0x334/0x1cc0 [ 1289.917347] ? lock_downgrade+0x630/0x630 [ 1289.921721] ? lock_acquire+0x12b/0x360 [ 1289.925691] ? get_signal+0x1e7/0x1cc0 [ 1289.929589] do_group_exit+0x100/0x2e0 [ 1289.933718] get_signal+0x39f/0x1cc0 [ 1289.937441] ? wait_consider_task+0x3150/0x3150 [ 1289.942340] ? __handle_mm_fault+0x821/0x2700 [ 1289.946843] do_signal+0x96/0x15d0 [ 1289.950590] ? SyS_waitid+0x290/0x290 [ 1289.954394] ? task_stopped_code+0x140/0x140 [ 1289.958797] ? setup_sigcontext+0x810/0x810 [ 1289.963357] ? HARDIRQ_verbose+0x10/0x10 [ 1289.967413] ? HARDIRQ_verbose+0x10/0x10 [ 1289.971704] ? kernel_wait4+0x210/0x210 [ 1289.975678] ? __do_page_fault+0x49f/0xbb0 [ 1289.979909] ? lock_downgrade+0x630/0x630 [ 1289.984420] ? exit_to_usermode_loop+0xcd/0x160 [ 1289.989096] exit_to_usermode_loop+0x11d/0x160 [ 1289.994660] do_syscall_64+0x3a3/0x520 [ 1289.998563] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1290.003975] RIP: 0033:0x413d7a [ 1290.007163] RSP: 002b:00007ffe8bf686c8 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 1290.015172] RAX: fffffffffffffe00 RBX: 0000000000003aab RCX: 0000000000413d7a [ 1290.022476] RDX: 0000000040000000 RSI: 00007ffe8bf686d4 RDI: ffffffffffffffff [ 1290.029740] RBP: 00000000000000f8 R08: 0000000000003aaa R09: 00000000010b2940 [ 1290.038534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000415a40 [ 1290.046595] R13: 00007ffe8bf68958 R14: 0000000000000000 R15: 0000000000000000 [ 1290.054781] INFO: task syz-executor.1:19892 blocked for more than 140 seconds. [ 1290.062169] Not tainted 4.14.150+ #0 [ 1290.066391] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1290.074747] syz-executor.1 D29088 19892 9054 0x80000000 [ 1290.080455] Call Trace: [ 1290.083049] ? __schedule+0x88c/0x1f80 [ 1290.086950] ? __sched_text_start+0x8/0x8 [ 1290.091612] ? rwsem_down_write_failed+0x3e9/0x7c0 [ 1290.096555] ? ___preempt_schedule+0x16/0x18 [ 1290.101247] ? rwsem_down_write_failed+0x3e9/0x7c0 [ 1290.106177] schedule+0x92/0x1c0 [ 1290.109544] rwsem_down_write_failed+0x3ee/0x7c0 [ 1290.114606] ? rwsem_down_read_failed_killable+0x5c0/0x5c0 [ 1290.121015] ? perf_trace_lock_acquire+0x122/0x4e0 [ 1290.125949] ? HARDIRQ_verbose+0x10/0x10 [ 1290.133987] call_rwsem_down_write_failed+0x13/0x20 [ 1290.139011] down_write+0x4f/0x90 [ 1290.142700] ? unlink_file_vma+0x6e/0xa0 [ 1290.146760] unlink_file_vma+0x6e/0xa0 [ 1290.150876] free_pgtables+0xb3/0x1c0 [ 1290.154688] exit_mmap+0x222/0x440 [ 1290.158224] ? SyS_munmap+0x30/0x30 [ 1290.162101] ? exit_aio+0x264/0x340 [ 1290.165722] ? reacquire_held_locks+0xb5/0x3f0 [ 1290.170574] mmput+0xeb/0x370 [ 1290.173684] do_exit+0x905/0x2a20 [ 1290.177147] ? HARDIRQ_verbose+0x10/0x10 [ 1290.181431] ? mm_update_next_owner+0x610/0x610 [ 1290.186106] ? get_signal+0x334/0x1cc0 [ 1290.189993] ? lock_downgrade+0x630/0x630 [ 1290.194377] ? lock_acquire+0x12b/0x360 [ 1290.198349] ? get_signal+0x1e7/0x1cc0 [ 1290.202452] do_group_exit+0x100/0x2e0 [ 1290.206342] get_signal+0x39f/0x1cc0 [ 1290.210294] ? perf_trace_lock_acquire+0x122/0x4e0 [ 1290.215236] do_signal+0x96/0x15d0 [ 1290.218786] ? __might_fault+0x104/0x1b0 [ 1290.223162] ? setup_sigcontext+0x810/0x810 [ 1290.227481] ? lock_acquire+0x12b/0x360 [ 1290.231676] ? __might_fault+0xd4/0x1b0 [ 1290.235676] ? _copy_to_user+0x82/0xd0 [ 1290.239571] ? SyS_futex+0x1c5/0x2c3 [ 1290.243537] ? SyS_futex+0x1cf/0x2c3 [ 1290.247257] ? do_futex+0x1980/0x1980 [ 1290.252033] ? exit_to_usermode_loop+0xcd/0x160 [ 1290.256708] exit_to_usermode_loop+0x11d/0x160 [ 1290.261504] do_syscall_64+0x3a3/0x520 [ 1290.265403] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1290.270813] RIP: 0033:0x459f39 [ 1290.274000] RSP: 002b:00007fc6c7b39cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1290.282028] RAX: 0000000000000001 RBX: 000000000075c1c8 RCX: 0000000000459f39 [ 1290.289294] RDX: 00000000004c846f RSI: 0000000000000081 RDI: 000000000075c1cc [ 1290.296891] RBP: 000000000075c1c0 R08: 0000000000000000 R09: 0000000000000000 [ 1290.304182] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075c1cc [ 1290.311679] R13: 00007ffdaf9f218f R14: 00007fc6c7b3a9c0 R15: 000000000075c1cc [ 1290.318981] INFO: task syz-executor.0:19852 blocked for more than 140 seconds. [ 1290.326665] Not tainted 4.14.150+ #0 [ 1290.330914] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1290.338874] syz-executor.0 D26768 19852 9924 0x80000000 [ 1290.344755] Call Trace: [ 1290.347355] ? __schedule+0x88c/0x1f80 [ 1290.351463] ? ___preempt_schedule+0x16/0x18 [ 1290.355881] ? __sched_text_start+0x8/0x8 [ 1290.360259] ? mark_held_locks+0xa6/0xf0 [ 1290.364327] ? rwsem_down_write_failed+0x3e9/0x7c0 [ 1290.369249] schedule+0x92/0x1c0 [ 1290.372855] rwsem_down_write_failed+0x3ee/0x7c0 [ 1290.377627] ? rwsem_down_read_failed_killable+0x5c0/0x5c0 [ 1290.384234] ? perf_trace_lock_acquire+0x122/0x4e0 [ 1290.389172] ? HARDIRQ_verbose+0x10/0x10 [ 1290.393476] call_rwsem_down_write_failed+0x13/0x20 [ 1290.398496] down_write+0x4f/0x90 [ 1290.402158] ? unlink_file_vma+0x6e/0xa0 [ 1290.406222] unlink_file_vma+0x6e/0xa0 [ 1290.410345] free_pgtables+0xb3/0x1c0 [ 1290.414153] exit_mmap+0x222/0x440 [ 1290.417690] ? SyS_munmap+0x30/0x30 [ 1290.421573] ? exit_aio+0x264/0x340 [ 1290.425195] ? reacquire_held_locks+0xb5/0x3f0 [ 1290.429809] mmput+0xeb/0x370 [ 1290.433144] do_exit+0x905/0x2a20 [ 1290.436608] ? HARDIRQ_verbose+0x10/0x10 [ 1290.440876] ? mm_update_next_owner+0x610/0x610 [ 1290.445552] ? get_signal+0x334/0x1cc0 [ 1290.449430] ? lock_downgrade+0x630/0x630 [ 1290.453867] ? lock_acquire+0x12b/0x360 [ 1290.457838] ? get_signal+0x1e7/0x1cc0 [ 1290.461945] do_group_exit+0x100/0x2e0 [ 1290.465842] get_signal+0x39f/0x1cc0 [ 1290.469559] ? perf_trace_lock_acquire+0x122/0x4e0 [ 1290.474734] do_signal+0x96/0x15d0 [ 1290.478283] ? __might_fault+0x104/0x1b0 [ 1290.482572] ? setup_sigcontext+0x810/0x810 [ 1290.486887] ? lock_acquire+0x12b/0x360 [ 1290.491082] ? __might_fault+0xd4/0x1b0 [ 1290.495076] ? _copy_to_user+0x82/0xd0 [ 1290.498967] ? SyS_futex+0x1c5/0x2c3 [ 1290.502916] ? SyS_futex+0x1cf/0x2c3 [ 1290.506637] ? do_futex+0x1980/0x1980 [ 1290.511426] ? exit_to_usermode_loop+0xcd/0x160 [ 1290.516102] exit_to_usermode_loop+0x11d/0x160 [ 1290.520902] do_syscall_64+0x3a3/0x520 [ 1290.524797] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1290.529978] RIP: 0033:0x459f39 [ 1290.533408] RSP: 002b:00007f2a7869ccf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1290.541140] RAX: fffffffffffffe00 RBX: 000000000075bfd0 RCX: 0000000000459f39 [ 1290.548402] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000075bfd0 [ 1290.556118] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1290.563412] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bfd4 [ 1290.570968] R13: 00007ffcc791354f R14: 00007f2a7869d9c0 R15: 000000000075bfd4 [ 1290.578272] INFO: task syz-executor.4:19858 blocked for more than 140 seconds. [ 1290.585881] Not tainted 4.14.150+ #0 [ 1290.590133] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1290.598176] syz-executor.4 D27584 19858 1835 0x80000000 [ 1290.604085] Call Trace: [ 1290.606689] ? __schedule+0x88c/0x1f80 [ 1290.610800] ? rwsem_optimistic_spin+0x1b4/0x400 [ 1290.615570] ? __sched_text_start+0x8/0x8 [ 1290.619719] ? mark_held_locks+0xa6/0xf0 [ 1290.624022] ? rwsem_down_write_failed+0x3e9/0x7c0 [ 1290.628950] schedule+0x92/0x1c0 [ 1290.632557] rwsem_down_write_failed+0x3ee/0x7c0 [ 1290.637327] ? rwsem_down_read_failed_killable+0x5c0/0x5c0 [ 1290.643916] ? perf_trace_lock_acquire+0x122/0x4e0 [ 1290.648851] ? HARDIRQ_verbose+0x10/0x10 [ 1290.653159] call_rwsem_down_write_failed+0x13/0x20 [ 1290.658183] down_write+0x4f/0x90 [ 1290.661847] ? unlink_file_vma+0x6e/0xa0 [ 1290.665905] unlink_file_vma+0x6e/0xa0 [ 1290.669788] free_pgtables+0xb3/0x1c0 [ 1290.673831] exit_mmap+0x222/0x440 [ 1290.677369] ? SyS_munmap+0x30/0x30 [ 1290.681306] ? exit_aio+0x264/0x340 [ 1290.684970] mmput+0xeb/0x370 [ 1290.688076] do_exit+0x905/0x2a20 [ 1290.691831] ? HARDIRQ_verbose+0x10/0x10 [ 1290.695892] ? mm_update_next_owner+0x610/0x610 [ 1290.700783] ? get_signal+0x334/0x1cc0 [ 1290.704668] ? lock_downgrade+0x630/0x630 [ 1290.708805] ? lock_acquire+0x12b/0x360 [ 1290.713013] ? get_signal+0x1e7/0x1cc0 [ 1290.716914] do_group_exit+0x100/0x2e0 [ 1290.721016] get_signal+0x39f/0x1cc0 [ 1290.724739] ? trace_hardirqs_on_caller+0x37b/0x540 [ 1290.729768] do_signal+0x96/0x15d0 [ 1290.733557] ? __might_fault+0x104/0x1b0 [ 1290.737618] ? setup_sigcontext+0x810/0x810 [ 1290.742180] ? _copy_to_user+0x82/0xd0 [ 1290.746078] ? put_timespec64+0xbe/0x110 [ 1290.750360] ? nsecs_to_jiffies+0x30/0x30 [ 1290.754519] ? SyS_poll+0x96/0x390 [ 1290.758056] ? exit_to_usermode_loop+0xcd/0x160 [ 1290.762972] exit_to_usermode_loop+0x11d/0x160 [ 1290.767576] do_syscall_64+0x3a3/0x520 [ 1290.772449] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1290.777636] RIP: 0033:0x459f39 [ 1290.781116] RSP: 002b:00007f5f3f863c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000007 [ 1290.788821] RAX: fffffffffffffdfc RBX: 0000000000000003 RCX: 0000000000459f39 [ 1290.796380] RDX: 00000000ffffffff RSI: 0000000000000000 RDI: 0000000000000000 [ 1290.803668] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1290.811181] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5f3f8646d4 [ 1290.818634] R13: 00000000004c7252 R14: 00000000004dcbf0 R15: 00000000ffffffff [ 1290.826241] [ 1290.826241] Showing all locks held in the system: [ 1290.832594] 1 lock held by khungtaskd/23: [ 1290.836856] #0: (tasklist_lock){.+.+}, at: [<00000000bd559043>] debug_show_all_locks+0x7c/0x21a [ 1290.845932] 2 locks held by getty/1761: [ 1290.849896] #0: (&tty->ldisc_sem){++++}, at: [<00000000d7010839>] tty_ldisc_ref_wait+0x22/0x80 [ 1290.858873] #1: (&ldata->atomic_read_lock){+.+.}, at: [<000000003cce8df2>] n_tty_read+0x1f7/0x1700 [ 1290.868168] 1 lock held by syz-executor.4/1827: [ 1290.872828] #0: (&mapping->i_mmap_rwsem){++++}, at: [<000000002cfb889a>] unlink_file_vma+0x6e/0xa0 [ 1290.882262] 1 lock held by syz-executor.1/9053: [ 1290.886912] #0: (&mapping->i_mmap_rwsem){++++}, at: [<000000002cfb889a>] unlink_file_vma+0x6e/0xa0 [ 1290.896198] 1 lock held by syz-executor.0/9923: [ 1290.900859] #0: (&mapping->i_mmap_rwsem){++++}, at: [<000000002cfb889a>] unlink_file_vma+0x6e/0xa0 [ 1290.910138] 1 lock held by syz-executor.3/10677: [ 1290.914887] #0: (&mapping->i_mmap_rwsem){++++}, at: [<000000002cfb889a>] unlink_file_vma+0x6e/0xa0 [ 1290.924213] 4 locks held by syz-executor.3/10678: [ 1290.929041] #0: (&dup_mmap_sem){.+.+}, at: [<000000005de6ce79>] copy_process.part.0+0x1ff5/0x66c0 [ 1290.938272] #1: (&mm->mmap_sem){++++}, at: [<00000000e39ef6d8>] copy_process.part.0+0x2011/0x66c0 [ 1290.947482] #2: (&mm->mmap_sem/1){+.+.}, at: [<00000000419adc81>] copy_process.part.0+0x204c/0x66c0 [ 1290.956858] #3: (&mapping->i_mmap_rwsem){++++}, at: [<000000007b591d0a>] copy_process.part.0+0x246a/0x66c0 [ 1290.966865] 1 lock held by syz-executor.2/12507: [ 1290.971620] #0: (&mapping->i_mmap_rwsem){++++}, at: [<000000002cfb889a>] unlink_file_vma+0x6e/0xa0 [ 1290.980982] 1 lock held by syz-executor.5/15018: [ 1290.985715] #0: (&mapping->i_mmap_rwsem){++++}, at: [<000000002cfb889a>] unlink_file_vma+0x6e/0xa0 [ 1290.995199] 1 lock held by syz-executor.0/19852: [ 1290.999949] #0: (&mapping->i_mmap_rwsem){++++}, at: [<000000002cfb889a>] unlink_file_vma+0x6e/0xa0 [ 1291.009243] 1 lock held by syz-executor.4/19858: [ 1291.013992] #0: (&mapping->i_mmap_rwsem){++++}, at: [<000000002cfb889a>] unlink_file_vma+0x6e/0xa0 12:21:24 executing program 1: r0 = open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x423, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) close(r1) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) ftruncate(r2, 0x200006) sendfile(r1, r2, 0x0, 0x8000fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7f, 0x0, 0xbe37f6de6e3cf31e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000, 0x7, 0x0, 0x6, 0x2}, 0x0, 0x5, r4, 0x2) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r5 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x33) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setreuid(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) socket$inet6(0xa, 0x802, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x30, 0x11, 0x11, 0x4, 0x6, 0xfffffb8e, 0x4, 0x15a, 0xffffffffffffffff}}) signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x2a87}, 0x8) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffc000/0x4000)=nil) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000900)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x10000026f) setfsgid(0xee00) 12:21:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000500)=[{0x28, 0x0, 0x0, "8ce7a5de694b82b5ea6cd79ac0f7459185aeebdf5f"}, {0x10, 0x0, 0x7}], 0x38}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 12:21:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setreuid(0x0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xa808) r3 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty, 0xffffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1800900000000000000000000000000000e1ffffff000000"], 0x18}}], 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 12:21:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) accept(r2, 0x0, &(0x7f0000000300)) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x104, r1, 0x10, 0x70bd2b, 0x25dfdbff, {}, [{{{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0x104}, 0x1, 0x0, 0x0, 0x814}, 0x4000) connect$inet6(r0, &(0x7f0000000680)={0xa, 0x0, 0x100, @loopback, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r3, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1291.023273] [ 1291.024881] ============================================= [ 1291.024881] [ 1291.069353] NMI backtrace for cpu 1 [ 1291.073059] CPU: 1 PID: 23 Comm: khungtaskd Not tainted 4.14.150+ #0 [ 1291.079547] Call Trace: [ 1291.082146] dump_stack+0xca/0x134 [ 1291.085700] ? irq_force_complete_move+0x281/0x2e5 [ 1291.090638] nmi_cpu_backtrace.cold+0x47/0x86 [ 1291.095139] ? irq_force_complete_move.cold+0x7b/0x7b [ 1291.100341] nmi_trigger_cpumask_backtrace+0x119/0x147 [ 1291.105625] watchdog+0x629/0xbe0 [ 1291.109090] ? reset_hung_task_detector+0x30/0x30 [ 1291.113939] kthread+0x31f/0x430 [ 1291.117305] ? kthread_create_on_node+0xf0/0xf0 [ 1291.121979] ret_from_fork+0x3a/0x50 [ 1291.125812] Sending NMI from CPU 1 to CPUs 0: [ 1291.130928] NMI backtrace for cpu 0 [ 1291.130932] CPU: 0 PID: 19944 Comm: syz-executor.3 Not tainted 4.14.150+ #0 [ 1291.130934] task: 00000000f25baaa3 task.stack: 00000000796d21fe [ 1291.130937] RIP: 0010:check_preemption_disabled+0xc/0x1f0 [ 1291.130939] RSP: 0018:ffff888193ea78d0 EFLAGS: 00000012 [ 1291.130944] RAX: 0000000000040000 RBX: 0000607e242181c8 RCX: 0000000000000232 [ 1291.130947] RDX: ffffffff81bd6c55 RSI: ffffffff8514a640 RDI: ffffffff8514a680 [ 1291.130950] RBP: ffff888193ea79e0 R08: 0000000000000000 R09: 0000000000000001 [ 1291.130952] R10: ffffffff833f5ea0 R11: ffffffff85a2ffeb R12: ffffffff856c0e20 [ 1291.130955] R13: ffffffff8514a640 R14: ffff888193ea79b8 R15: 0000000000000000 [ 1291.130958] FS: 00007fd2ae785700(0000) GS:ffff8881dba00000(0000) knlGS:0000000000000000 [ 1291.130961] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1291.130963] CR2: 0000000000738000 CR3: 0000000173b58001 CR4: 00000000001606b0 [ 1291.130966] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1291.130969] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1291.130970] Call Trace: [ 1291.130973] perf_trace_lock_acquire+0x122/0x4e0 [ 1291.130975] ? HARDIRQ_verbose+0x10/0x10 [ 1291.130977] ? __delayacct_tsk_init+0x1b/0x80 [ 1291.130979] ? __kasan_kmalloc.part.0+0x8a/0xc0 [ 1291.130981] ? __kasan_kmalloc.part.0+0x53/0xc0 [ 1291.130983] lock_acquire+0x279/0x360 [ 1291.130985] ? __debug_object_init+0x1d2/0x7d0 [ 1291.130987] _raw_spin_lock+0x2a/0x40 [ 1291.130989] ? __debug_object_init+0x1d2/0x7d0 [ 1291.130991] __debug_object_init+0x1d2/0x7d0 [ 1291.130994] ? debug_object_free+0x2f0/0x2f0 [ 1291.130995] ? retint_kernel+0x2d/0x2d [ 1291.130997] hrtimer_init+0x27/0x2f0 [ 1291.130999] init_dl_task_timer+0x17/0x50 [ 1291.131001] __sched_fork.isra.0+0x215/0x440 [ 1291.131003] sched_fork+0x2e/0xda0 [ 1291.131005] ? __lockdep_init_map+0x100/0x4a0 [ 1291.131008] copy_process.part.0+0x12ad/0x66c0 [ 1291.131016] ? retint_kernel+0x2d/0x2d [ 1291.131018] ? trace_hardirqs_on_caller+0x37b/0x540 [ 1291.131020] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1291.131022] ? __cleanup_sighand+0x50/0x50 [ 1291.131024] _do_fork+0x197/0xce0 [ 1291.131026] ? fork_idle+0x260/0x260 [ 1291.131028] ? SyS_clock_gettime+0x7d/0xe0 [ 1291.131030] ? do_clock_gettime+0xd0/0xd0 [ 1291.131032] ? do_syscall_64+0x43/0x520 [ 1291.131034] ? sys_vfork+0x20/0x20 [ 1291.131036] do_syscall_64+0x19b/0x520 [ 1291.131038] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1291.131040] RIP: 0033:0x459f39 [ 1291.131042] RSP: 002b:00007fd2ae784c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1291.131047] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459f39 [ 1291.131049] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 1291.131052] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1291.131055] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd2ae7856d4 [ 1291.131058] R13: 00000000004c05bf R14: 00000000004d2ab0 R15: 00000000ffffffff [ 1291.131059] Code: ff ff e8 18 83 96 ff e9 eb f2 ff ff e8 5e 21 50 ff 48 8b 3c 24 e8 e5 82 96 ff e9 c6 f7 ff ff 41 57 41 56 41 55 49 89 f5 41 54 55 <48> 89 fd 53 e8 6b b6 73 ff 65 44 8b 25 b3 16 24 7c 65 8b 05 cc [ 1291.166783] Kernel panic - not syncing: hung_task: blocked tasks [ 1291.432301] CPU: 1 PID: 23 Comm: khungtaskd Not tainted 4.14.150+ #0 [ 1291.438789] Call Trace: [ 1291.441390] dump_stack+0xca/0x134 [ 1291.444938] panic+0x1f1/0x3da [ 1291.448128] ? add_taint.cold+0x16/0x16 [ 1291.452138] ? irq_force_complete_move.cold+0x7b/0x7b [ 1291.457330] ? ___preempt_schedule+0x16/0x18 [ 1291.461754] watchdog+0x63a/0xbe0 [ 1291.465210] ? reset_hung_task_detector+0x30/0x30 [ 1291.470055] kthread+0x31f/0x430 [ 1291.473421] ? kthread_create_on_node+0xf0/0xf0 [ 1291.478090] ret_from_fork+0x3a/0x50 [ 1291.482428] Kernel Offset: 0x2200000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 1291.493251] Rebooting in 86400 seconds..