5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x0, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:02 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0xffffffffffffffff) [ 799.747678][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 799.753705][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:16:03 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="880000000000000000000000000000004b916a4ab582f1cde43db451c3b73a6e0015ca541800ddc1c87374016070b28f91ed00121a33089b1202ac4469586b5cd7316b0eb7eb4f65c697b62fa22233bb0dc3761c0ec74af621007478380c76fd4819158aa4c8953091c5ee57b6af4d4f23d68a6be5bb5fc153dd91275690c1c210166ef76553251fa6e6ed30320000000000000088000000000000000000000000000000a11c9941c827594636d0ed22245a5a10c105fa9e5fa854034788ffa67a4d0ef0087194bde2c16a8da015cecef8cbedc7a040d56fd2c70294fac6e04fcb06fdf7766d17e065588cf0f6fef64c8b3bdd4e238567d04955c3ed781fdb180d5c918a2bb356872fe273942f735e737e76bc6cff00000000000000b8000000000000000000000000000000ec7200af80deb7070d132f509140ad451a315ab23dbaa1eceba20684372f886756934385d802583b0cdfab1045111a2ebaa782cd3382141abaed99740ec265bd542e7ad79947b882ff9bfed684bd82a5526b9a6a16f009a5e54327c0ea1156e26966fba43740aee2db64c6368748e13f558e81154b69c55db4c4a33c189e0cfa09d2477a92e69cb9c942e9f89594b82359d61be92447f9e1f5468cf2a3c175dc0c00000000000000380700000000000000000000000000009fcac400e3038227d48fe53a9ecdcd5ea87c6bf10242f192e3ef4193802661d9a05906a67fc45ca98325ac1f56469e5ccaefdf9757467dc9e07b318defa2f43793a0f46a339905e2883fbd9df49f964b761f58660148b78e25d04f5f3d430f884c7393a1bc7437f2ea06b5b944ba35f5cf11acafea1e44b0ff07e63db48b7875a999246e2ee5e24ec030a345c7ff01c3a7e2b73cc8fe41dc9cea2f2bf286532b2e98bd08786bbc45b146a12c4008cab72bd461a68c97b32764753bd40d1cd866106f8b59afbf9c2d39ab89a852f1e4206f165d84f86650d7a6e95d07646566a978e6a09e87082fa680afc436db5714e4de604155c02beb678d661b523bca634536466aa812084530ec0bd708695afc9977618cd41752fbe87bfaae8b208bfd009c7bcf50067ea2b00b4fe473de5e7467e511fa2340c08d8303c95c7d0d786af9b6dbb1e591f5a5251ee4c3ba8d961d424684a966fef07bc64c15dfd26bc29861393ebf983b711a7e91baca153f8c0f168544e900b89dda8f7edbfcb4af904571d21d343116ba679a73ec800519cd99d40733c4d7c4b514c5c1555f17a43a7e787f13e2267c1b01ca02c00bd618658702ac0c4fc5158c9b0cd7f1f3e74772627cf4e5764d912e9e375f93fda32ba05f5e3e13c7c7668e6aac724ac6b863f974b253f12a783fe5ffc4e5684e1b5b93e03e42c09f239e2307052b3e316a8846f17fface69e73a0452ac529ebcfdbca1c6087d77f54c8477ce7bb834ed175ef8dc12e4e126ea89dbf538011906a895f3d378928318891ae6679b459f0708ccb57a5e8c2c0adb18864d7f26c43e388a9cff63143b172ebedd26513bd3708d8fd07ebd0c0a858d6a81185055324f7da0382140dea52fc1db2d04fe6dd24e4b3ca065af6f8cea69c515465db52bfa52fa4eec1061b2b58b7893844815a47a70a80e042d75fc9df871c9979c047ef254b73a86f597d77ae36e34a9279a521f491a27edd3753fad0c394d7e85128daa37a17c67328ea194606cd5de9d3f46d1b12ea31608f76381f6ac49dd2bdd15908db765bc1b940a2ef37780c19caf159441a1afbe0ed600c8178f5b68b84ccd6a727353fe1c545b75f67eee2cb7218e73ca1a9507d67709d0a40c20a4072741dd3f0943184c2941651e51d9b39c215e206b0dfb9d4c5e33229f914a8ce74a0ad5e25fe09958bece82cb0703eedbe642177902ede236aa7fe42a37030e125c13dcd9e88c69f51e99df9ddf6569934a04be70099d39bebbaef5353f7ddd0f4d52452da9b1074bc069af2b295298492611a907cb6547a2eb129747811db9a22cd95f0807c6504ab11e629ce8ed90e40800515e164f9cbf335670b55489b33ae265675fd6293d73185f4066a914ddfd610f415ac8e6ee3a50c2d2ab1bd470528ac04ceb7ec8771d3cbc3a45abc10e9e813d2c35c836de3c2e7631ab0e784ac45cbbebaca629b26b1a26c6dea42a6740aa3fb5b1e4d5d0f202caa906241d258b4b1e319e6a79f446e93fd0363377cd1652edf941387df56c3e53b9a404519d980470797cfeee39e00cfd57c0c29903b8267b755e29515f932728b5bdcf5aaf407aa240d41ac9f65fada0cb68a1057fc647492b3bd1c49e4dd644846879d59d6aac50ad5364dc15cc42d3370f1ca71823ae545b11e2240f9477cb45c7b277d2bf0e654933a4cac95cde02415624a76ff5769c66eed885835c5537abcc1d013de5160261f19738907a6462184be35887200c30b0a4ff3cd8adff03c8057bef7193295b613ca8b4f74fec054e4a3f9f1c85f70531f4f983f5ec19dab4ac0f435d121d7491e46f4e2b7514a85a9fdfb89fe5167c0506d393fc28aac832002c23b07acd5577562e4c085e93972b15dc03bb64d11cd060418182eca96b357c7f11a2ab2be37bb1a6f5988a776c473025c5ed4dae98b11b2cbdfc10e0d514e71b2b519b8590eee8b1276db3ef9c1e34abfc11d1ceed6c5b6a229f6e697e45d888450da7072489347eea11c78f3c63d5412c71bec8cdbbbb4f012874006473c959a98f622e8437bbf27b7dcd62f9974ccba053b80226df4c21860174dbc22d785932bacb0853764e7a417ba2f635d48b31869487ead5736a8fd0f74c29599858c9c168d473515d5a5507879916ae2ef258133898a4d2632ca1f056e261844dcf68f842485f560d38ba49cea70b7b769d999f2810f66ed2a8330c0d5ecc845eaf2892f2814b7edbdb2f11071487ea2fdb140920128a0eaf403d1c865820664247e94c5545251d084f29b99ebea8e4b0e13e8eaf24e8581844e78432c701a81756a9708949099a455744de281736a7b3b912836bfcdb3a42d2be821a707e98a34351d0875cf0008cd7d45e6889ad39b4794f565b60950165c1b173564f1b49e16726dfc5762e424abaa988e1347157243662a961b5dea4e3600c510fa4f517b667a67be0cd5a43fafa1617e6ae15a72bce7dd9f90115348e4813188f51e77a9d4d61cef041d89728d746a59d391f6069b5ffe1e41729ce633f7e659cff645b76e0692ad346feee0508f76a4c35e5a2da7277d7edb8e5c544"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000), 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:03 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:03 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0xffffffffffffffff) 14:16:03 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="880000000000000000000000000000004b916a4ab582f1cde43db451c3b73a6e0015ca541800ddc1c87374016070b28f91ed00121a33089b1202ac4469586b5cd7316b0eb7eb4f65c697b62fa22233bb0dc3761c0ec74af621007478380c76fd4819158aa4c8953091c5ee57b6af4d4f23d68a6be5bb5fc153dd91275690c1c210166ef76553251fa6e6ed30320000000000000088000000000000000000000000000000a11c9941c827594636d0ed22245a5a10c105fa9e5fa854034788ffa67a4d0ef0087194bde2c16a8da015cecef8cbedc7a040d56fd2c70294fac6e04fcb06fdf7766d17e065588cf0f6fef64c8b3bdd4e238567d04955c3ed781fdb180d5c918a2bb356872fe273942f735e737e76bc6cff00000000000000b8000000000000000000000000000000ec7200af80deb7070d132f509140ad451a315ab23dbaa1eceba20684372f886756934385d802583b0cdfab1045111a2ebaa782cd3382141abaed99740ec265bd542e7ad79947b882ff9bfed684bd82a5526b9a6a16f009a5e54327c0ea1156e26966fba43740aee2db64c6368748e13f558e81154b69c55db4c4a33c189e0cfa09d2477a92e69cb9c942e9f89594b82359d61be92447f9e1f5468cf2a3c175dc0c00000000000000380700000000000000000000000000009fcac400e3038227d48fe53a9ecdcd5ea87c6bf10242f192e3ef4193802661d9a05906a67fc45ca98325ac1f56469e5ccaefdf9757467dc9e07b318defa2f43793a0f46a339905e2883fbd9df49f964b761f58660148b78e25d04f5f3d430f884c7393a1bc7437f2ea06b5b944ba35f5cf11acafea1e44b0ff07e63db48b7875a999246e2ee5e24ec030a345c7ff01c3a7e2b73cc8fe41dc9cea2f2bf286532b2e98bd08786bbc45b146a12c4008cab72bd461a68c97b32764753bd40d1cd866106f8b59afbf9c2d39ab89a852f1e4206f165d84f86650d7a6e95d07646566a978e6a09e87082fa680afc436db5714e4de604155c02beb678d661b523bca634536466aa812084530ec0bd708695afc9977618cd41752fbe87bfaae8b208bfd009c7bcf50067ea2b00b4fe473de5e7467e511fa2340c08d8303c95c7d0d786af9b6dbb1e591f5a5251ee4c3ba8d961d424684a966fef07bc64c15dfd26bc29861393ebf983b711a7e91baca153f8c0f168544e900b89dda8f7edbfcb4af904571d21d343116ba679a73ec800519cd99d40733c4d7c4b514c5c1555f17a43a7e787f13e2267c1b01ca02c00bd618658702ac0c4fc5158c9b0cd7f1f3e74772627cf4e5764d912e9e375f93fda32ba05f5e3e13c7c7668e6aac724ac6b863f974b253f12a783fe5ffc4e5684e1b5b93e03e42c09f239e2307052b3e316a8846f17fface69e73a0452ac529ebcfdbca1c6087d77f54c8477ce7bb834ed175ef8dc12e4e126ea89dbf538011906a895f3d378928318891ae6679b459f0708ccb57a5e8c2c0adb18864d7f26c43e388a9cff63143b172ebedd26513bd3708d8fd07ebd0c0a858d6a81185055324f7da0382140dea52fc1db2d04fe6dd24e4b3ca065af6f8cea69c515465db52bfa52fa4eec1061b2b58b7893844815a47a70a80e042d75fc9df871c9979c047ef254b73a86f597d77ae36e34a9279a521f491a27edd3753fad0c394d7e85128daa37a17c67328ea194606cd5de9d3f46d1b12ea31608f76381f6ac49dd2bdd15908db765bc1b940a2ef37780c19caf159441a1afbe0ed600c8178f5b68b84ccd6a727353fe1c545b75f67eee2cb7218e73ca1a9507d67709d0a40c20a4072741dd3f0943184c2941651e51d9b39c215e206b0dfb9d4c5e33229f914a8ce74a0ad5e25fe09958bece82cb0703eedbe642177902ede236aa7fe42a37030e125c13dcd9e88c69f51e99df9ddf6569934a04be70099d39bebbaef5353f7ddd0f4d52452da9b1074bc069af2b295298492611a907cb6547a2eb129747811db9a22cd95f0807c6504ab11e629ce8ed90e40800515e164f9cbf335670b55489b33ae265675fd6293d73185f4066a914ddfd610f415ac8e6ee3a50c2d2ab1bd470528ac04ceb7ec8771d3cbc3a45abc10e9e813d2c35c836de3c2e7631ab0e784ac45cbbebaca629b26b1a26c6dea42a6740aa3fb5b1e4d5d0f202caa906241d258b4b1e319e6a79f446e93fd0363377cd1652edf941387df56c3e53b9a404519d980470797cfeee39e00cfd57c0c29903b8267b755e29515f932728b5bdcf5aaf407aa240d41ac9f65fada0cb68a1057fc647492b3bd1c49e4dd644846879d59d6aac50ad5364dc15cc42d3370f1ca71823ae545b11e2240f9477cb45c7b277d2bf0e654933a4cac95cde02415624a76ff5769c66eed885835c5537abcc1d013de5160261f19738907a6462184be35887200c30b0a4ff3cd8adff03c8057bef7193295b613ca8b4f74fec054e4a3f9f1c85f70531f4f983f5ec19dab4ac0f435d121d7491e46f4e2b7514a85a9fdfb89fe5167c0506d393fc28aac832002c23b07acd5577562e4c085e93972b15dc03bb64d11cd060418182eca96b357c7f11a2ab2be37bb1a6f5988a776c473025c5ed4dae98b11b2cbdfc10e0d514e71b2b519b8590eee8b1276db3ef9c1e34abfc11d1ceed6c5b6a229f6e697e45d888450da7072489347eea11c78f3c63d5412c71bec8cdbbbb4f012874006473c959a98f622e8437bbf27b7dcd62f9974ccba053b80226df4c21860174dbc22d785932bacb0853764e7a417ba2f635d48b31869487ead5736a8fd0f74c29599858c9c168d473515d5a5507879916ae2ef258133898a4d2632ca1f056e261844dcf68f842485f560d38ba49cea70b7b769d999f2810f66ed2a8330c0d5ecc845eaf2892f2814b7edbdb2f11071487ea2fdb140920128a0eaf403d1c865820664247e94c5545251d084f29b99ebea8e4b0e13e8eaf24e8581844e78432c701a81756a9708949099a455744de281736a7b3b912836bfcdb3a42d2be821a707e98a34351d0875cf0008cd7d45e6889ad39b4794f565b60950165c1b173564f1b49e16726dfc5762e424abaa988e1347157243662a961b5dea4e3600c510fa4f517b667a67be0cd5a43fafa1617e6ae15a72bce7dd9f90115348e4813188f51e77a9d4d61cef041d89728d746a59d391f6069b5ffe1e41729ce633f7e659cff645b76e0692ad346feee0508f76a4c35e5a2da7277d7edb8e5c544"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e423", 0x97) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:03 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x0, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:03 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:03 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0xffffffffffffffff) 14:16:03 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e423", 0x97) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:03 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:03 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:03 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e423", 0x97) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:03 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0xffffffffffffffff) 14:16:03 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:03 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd64", 0xe3) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:03 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x0, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:03 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0xffffffffffffffff) 14:16:03 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x0, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:03 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:03 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:03 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd64", 0xe3) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:03 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0xffffffffffffffff) 14:16:03 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x0, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:04 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd64", 0xe3) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:04 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:04 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x0, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:04 executing program 1: request_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='&+\x00', 0xfffffffffffffffd) socketpair$unix(0x1, 0x20007, 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x60503, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={0x0, 0x0, 0x18}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TCSETX(r0, 0x5433, &(0x7f0000001580)={0x0, 0x3, [0x3c, 0x4, 0x10000000]}) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x5, 0x2, 0x3, 0xcb7, 0x6, 0x200, 0x10001, {0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xb0, 0x0, 0x0, 0xff, 0xd54}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, 0x0, &(0x7f0000000300)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 14:16:04 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x0, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:04 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x0, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:04 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x109) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:04 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x0, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:04 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x0, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:04 executing program 1: write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0xe8940, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x1, 0xffffffffffffffff}) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r1, 0x0) socket(0x0, 0x4, 0x311) 14:16:04 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="880000000000000000000000000000004b916a4ab582f1cde43db451c3b73a6e0015ca541800ddc1c87374016070b28f91ed00121a33089b1202ac4469586b5cd7316b0eb7eb4f65c697b62fa22233bb0dc3761c0ec74af621007478380c76fd4819158aa4c8953091c5ee57b6af4d4f23d68a6be5bb5fc153dd91275690c1c210166ef76553251fa6e6ed30320000000000000088000000000000000000000000000000a11c9941c827594636d0ed22245a5a10c105fa9e5fa854034788ffa67a4d0ef0087194bde2c16a8da015cecef8cbedc7a040d56fd2c70294fac6e04fcb06fdf7766d17e065588cf0f6fef64c8b3bdd4e238567d04955c3ed781fdb180d5c918a2bb356872fe273942f735e737e76bc6cff00000000000000b8000000000000000000000000000000ec7200af80deb7070d132f509140ad451a315ab23dbaa1eceba20684372f886756934385d802583b0cdfab1045111a2ebaa782cd3382141abaed99740ec265bd542e7ad79947b882ff9bfed684bd82a5526b9a6a16f009a5e54327c0ea1156e26966fba43740aee2db64c6368748e13f558e81154b69c55db4c4a33c189e0cfa09d2477a92e69cb9c942e9f89594b82359d61be92447f9e1f5468cf2a3c175dc0c00000000000000380700000000000000000000000000009fcac400e3038227d48fe53a9ecdcd5ea87c6bf10242f192e3ef4193802661d9a05906a67fc45ca98325ac1f56469e5ccaefdf9757467dc9e07b318defa2f43793a0f46a339905e2883fbd9df49f964b761f58660148b78e25d04f5f3d430f884c7393a1bc7437f2ea06b5b944ba35f5cf11acafea1e44b0ff07e63db48b7875a999246e2ee5e24ec030a345c7ff01c3a7e2b73cc8fe41dc9cea2f2bf286532b2e98bd08786bbc45b146a12c4008cab72bd461a68c97b32764753bd40d1cd866106f8b59afbf9c2d39ab89a852f1e4206f165d84f86650d7a6e95d07646566a978e6a09e87082fa680afc436db5714e4de604155c02beb678d661b523bca634536466aa812084530ec0bd708695afc9977618cd41752fbe87bfaae8b208bfd009c7bcf50067ea2b00b4fe473de5e7467e511fa2340c08d8303c95c7d0d786af9b6dbb1e591f5a5251ee4c3ba8d961d424684a966fef07bc64c15dfd26bc29861393ebf983b711a7e91baca153f8c0f168544e900b89dda8f7edbfcb4af904571d21d343116ba679a73ec800519cd99d40733c4d7c4b514c5c1555f17a43a7e787f13e2267c1b01ca02c00bd618658702ac0c4fc5158c9b0cd7f1f3e74772627cf4e5764d912e9e375f93fda32ba05f5e3e13c7c7668e6aac724ac6b863f974b253f12a783fe5ffc4e5684e1b5b93e03e42c09f239e2307052b3e316a8846f17fface69e73a0452ac529ebcfdbca1c6087d77f54c8477ce7bb834ed175ef8dc12e4e126ea89dbf538011906a895f3d378928318891ae6679b459f0708ccb57a5e8c2c0adb18864d7f26c43e388a9cff63143b172ebedd26513bd3708d8fd07ebd0c0a858d6a81185055324f7da0382140dea52fc1db2d04fe6dd24e4b3ca065af6f8cea69c515465db52bfa52fa4eec1061b2b58b7893844815a47a70a80e042d75fc9df871c9979c047ef254b73a86f597d77ae36e34a9279a521f491a27edd3753fad0c394d7e85128daa37a17c67328ea194606cd5de9d3f46d1b12ea31608f76381f6ac49dd2bdd15908db765bc1b940a2ef37780c19caf159441a1afbe0ed600c8178f5b68b84ccd6a727353fe1c545b75f67eee2cb7218e73ca1a9507d67709d0a40c20a4072741dd3f0943184c2941651e51d9b39c215e206b0dfb9d4c5e33229f914a8ce74a0ad5e25fe09958bece82cb0703eedbe642177902ede236aa7fe42a37030e125c13dcd9e88c69f51e99df9ddf6569934a04be70099d39bebbaef5353f7ddd0f4d52452da9b1074bc069af2b295298492611a907cb6547a2eb129747811db9a22cd95f0807c6504ab11e629ce8ed90e40800515e164f9cbf335670b55489b33ae265675fd6293d73185f4066a914ddfd610f415ac8e6ee3a50c2d2ab1bd470528ac04ceb7ec8771d3cbc3a45abc10e9e813d2c35c836de3c2e7631ab0e784ac45cbbebaca629b26b1a26c6dea42a6740aa3fb5b1e4d5d0f202caa906241d258b4b1e319e6a79f446e93fd0363377cd1652edf941387df56c3e53b9a404519d980470797cfeee39e00cfd57c0c29903b8267b755e29515f932728b5bdcf5aaf407aa240d41ac9f65fada0cb68a1057fc647492b3bd1c49e4dd644846879d59d6aac50ad5364dc15cc42d3370f1ca71823ae545b11e2240f9477cb45c7b277d2bf0e654933a4cac95cde02415624a76ff5769c66eed885835c5537abcc1d013de5160261f19738907a6462184be35887200c30b0a4ff3cd8adff03c8057bef7193295b613ca8b4f74fec054e4a3f9f1c85f70531f4f983f5ec19dab4ac0f435d121d7491e46f4e2b7514a85a9fdfb89fe5167c0506d393fc28aac832002c23b07acd5577562e4c085e93972b15dc03bb64d11cd060418182eca96b357c7f11a2ab2be37bb1a6f5988a776c473025c5ed4dae98b11b2cbdfc10e0d514e71b2b519b8590eee8b1276db3ef9c1e34abfc11d1ceed6c5b6a229f6e697e45d888450da7072489347eea11c78f3c63d5412c71bec8cdbbbb4f012874006473c959a98f622e8437bbf27b7dcd62f9974ccba053b80226df4c21860174dbc22d785932bacb0853764e7a417ba2f635d48b31869487ead5736a8fd0f74c29599858c9c168d473515d5a5507879916ae2ef258133898a4d2632ca1f056e261844dcf68f842485f560d38ba49cea70b7b769d999f2810f66ed2a8330c0d5ecc845eaf2892f2814b7edbdb2f11071487ea2fdb140920128a0eaf403d1c865820664247e94c5545251d084f29b99ebea8e4b0e13e8eaf24e8581844e78432c701a81756a9708949099a455744de281736a7b3b912836bfcdb3a42d2be821a707e98a34351d0875cf0008cd7d45e6889ad39b4794f565b60950165c1b173564f1b49e16726dfc5762e424abaa988e1347157243662a961b5dea4e3600c510fa4f517b667a67be0cd5a43fafa1617e6ae15a72bce7dd9f90115348e4813188f51e77a9d4d61cef041d89728d746a59d391f6069b5ffe1e41729ce633f7e659cff645b76e0692ad346feee0508f76a4c35e5a2da7277d7edb8e5c544"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd645413be450000000000000001c122283846253398a04d99ca8680deb20632834bc027c44d4cf3", 0x109) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:04 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x0, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:04 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x0, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:04 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x0, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:04 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="880000000000000000000000000000004b916a4ab582f1cde43db451c3b73a6e0015ca541800ddc1c87374016070b28f91ed00121a33089b1202ac4469586b5cd7316b0eb7eb4f65c697b62fa22233bb0dc3761c0ec74af621007478380c76fd4819158aa4c8953091c5ee57b6af4d4f23d68a6be5bb5fc153dd91275690c1c210166ef76553251fa6e6ed30320000000000000088000000000000000000000000000000a11c9941c827594636d0ed22245a5a10c105fa9e5fa854034788ffa67a4d0ef0087194bde2c16a8da015cecef8cbedc7a040d56fd2c70294fac6e04fcb06fdf7766d17e065588cf0f6fef64c8b3bdd4e238567d04955c3ed781fdb180d5c918a2bb356872fe273942f735e737e76bc6cff00000000000000b8000000000000000000000000000000ec7200af80deb7070d132f509140ad451a315ab23dbaa1eceba20684372f886756934385d802583b0cdfab1045111a2ebaa782cd3382141abaed99740ec265bd542e7ad79947b882ff9bfed684bd82a5526b9a6a16f009a5e54327c0ea1156e26966fba43740aee2db64c6368748e13f558e81154b69c55db4c4a33c189e0cfa09d2477a92e69cb9c942e9f89594b82359d61be92447f9e1f5468cf2a3c175dc0c00000000000000380700000000000000000000000000009fcac400e3038227d48fe53a9ecdcd5ea87c6bf10242f192e3ef4193802661d9a05906a67fc45ca98325ac1f56469e5ccaefdf9757467dc9e07b318defa2f43793a0f46a339905e2883fbd9df49f964b761f58660148b78e25d04f5f3d430f884c7393a1bc7437f2ea06b5b944ba35f5cf11acafea1e44b0ff07e63db48b7875a999246e2ee5e24ec030a345c7ff01c3a7e2b73cc8fe41dc9cea2f2bf286532b2e98bd08786bbc45b146a12c4008cab72bd461a68c97b32764753bd40d1cd866106f8b59afbf9c2d39ab89a852f1e4206f165d84f86650d7a6e95d07646566a978e6a09e87082fa680afc436db5714e4de604155c02beb678d661b523bca634536466aa812084530ec0bd708695afc9977618cd41752fbe87bfaae8b208bfd009c7bcf50067ea2b00b4fe473de5e7467e511fa2340c08d8303c95c7d0d786af9b6dbb1e591f5a5251ee4c3ba8d961d424684a966fef07bc64c15dfd26bc29861393ebf983b711a7e91baca153f8c0f168544e900b89dda8f7edbfcb4af904571d21d343116ba679a73ec800519cd99d40733c4d7c4b514c5c1555f17a43a7e787f13e2267c1b01ca02c00bd618658702ac0c4fc5158c9b0cd7f1f3e74772627cf4e5764d912e9e375f93fda32ba05f5e3e13c7c7668e6aac724ac6b863f974b253f12a783fe5ffc4e5684e1b5b93e03e42c09f239e2307052b3e316a8846f17fface69e73a0452ac529ebcfdbca1c6087d77f54c8477ce7bb834ed175ef8dc12e4e126ea89dbf538011906a895f3d378928318891ae6679b459f0708ccb57a5e8c2c0adb18864d7f26c43e388a9cff63143b172ebedd26513bd3708d8fd07ebd0c0a858d6a81185055324f7da0382140dea52fc1db2d04fe6dd24e4b3ca065af6f8cea69c515465db52bfa52fa4eec1061b2b58b7893844815a47a70a80e042d75fc9df871c9979c047ef254b73a86f597d77ae36e34a9279a521f491a27edd3753fad0c394d7e85128daa37a17c67328ea194606cd5de9d3f46d1b12ea31608f76381f6ac49dd2bdd15908db765bc1b940a2ef37780c19caf159441a1afbe0ed600c8178f5b68b84ccd6a727353fe1c545b75f67eee2cb7218e73ca1a9507d67709d0a40c20a4072741dd3f0943184c2941651e51d9b39c215e206b0dfb9d4c5e33229f914a8ce74a0ad5e25fe09958bece82cb0703eedbe642177902ede236aa7fe42a37030e125c13dcd9e88c69f51e99df9ddf6569934a04be70099d39bebbaef5353f7ddd0f4d52452da9b1074bc069af2b295298492611a907cb6547a2eb129747811db9a22cd95f0807c6504ab11e629ce8ed90e40800515e164f9cbf335670b55489b33ae265675fd6293d73185f4066a914ddfd610f415ac8e6ee3a50c2d2ab1bd470528ac04ceb7ec8771d3cbc3a45abc10e9e813d2c35c836de3c2e7631ab0e784ac45cbbebaca629b26b1a26c6dea42a6740aa3fb5b1e4d5d0f202caa906241d258b4b1e319e6a79f446e93fd0363377cd1652edf941387df56c3e53b9a404519d980470797cfeee39e00cfd57c0c29903b8267b755e29515f932728b5bdcf5aaf407aa240d41ac9f65fada0cb68a1057fc647492b3bd1c49e4dd644846879d59d6aac50ad5364dc15cc42d3370f1ca71823ae545b11e2240f9477cb45c7b277d2bf0e654933a4cac95cde02415624a76ff5769c66eed885835c5537abcc1d013de5160261f19738907a6462184be35887200c30b0a4ff3cd8adff03c8057bef7193295b613ca8b4f74fec054e4a3f9f1c85f70531f4f983f5ec19dab4ac0f435d121d7491e46f4e2b7514a85a9fdfb89fe5167c0506d393fc28aac832002c23b07acd5577562e4c085e93972b15dc03bb64d11cd060418182eca96b357c7f11a2ab2be37bb1a6f5988a776c473025c5ed4dae98b11b2cbdfc10e0d514e71b2b519b8590eee8b1276db3ef9c1e34abfc11d1ceed6c5b6a229f6e697e45d888450da7072489347eea11c78f3c63d5412c71bec8cdbbbb4f012874006473c959a98f622e8437bbf27b7dcd62f9974ccba053b80226df4c21860174dbc22d785932bacb0853764e7a417ba2f635d48b31869487ead5736a8fd0f74c29599858c9c168d473515d5a5507879916ae2ef258133898a4d2632ca1f056e261844dcf68f842485f560d38ba49cea70b7b769d999f2810f66ed2a8330c0d5ecc845eaf2892f2814b7edbdb2f11071487ea2fdb140920128a0eaf403d1c865820664247e94c5545251d084f29b99ebea8e4b0e13e8eaf24e8581844e78432c701a81756a9708949099a455744de281736a7b3b912836bfcdb3a42d2be821a707e98a34351d0875cf0008cd7d45e6889ad39b4794f565b60950165c1b173564f1b49e16726dfc5762e424abaa988e1347157243662a961b5dea4e3600c510fa4f517b667a67be0cd5a43fafa1617e6ae15a72bce7dd9f90115348e4813188f51e77a9d4d61cef041d89728d746a59d391f6069b5ffe1e41729ce633f7e659cff645b76e0692ad346feee0508f76a4c35e5a2da7277d7edb8e5c544"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x109) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e0bcfe87b0071") r1 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r1, &(0x7f0000000040)={0x2, 0x1004e20, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x8084, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYRESHEX], 0x1}}, 0x0) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 14:16:04 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x11c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:04 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x0, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:04 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x0, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:04 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="880000000000000000000000000000004b916a4ab582f1cde43db451c3b73a6e0015ca541800ddc1c87374016070b28f91ed00121a33089b1202ac4469586b5cd7316b0eb7eb4f65c697b62fa22233bb0dc3761c0ec74af621007478380c76fd4819158aa4c8953091c5ee57b6af4d4f23d68a6be5bb5fc153dd91275690c1c210166ef76553251fa6e6ed30320000000000000088000000000000000000000000000000a11c9941c827594636d0ed22245a5a10c105fa9e5fa854034788ffa67a4d0ef0087194bde2c16a8da015cecef8cbedc7a040d56fd2c70294fac6e04fcb06fdf7766d17e065588cf0f6fef64c8b3bdd4e238567d04955c3ed781fdb180d5c918a2bb356872fe273942f735e737e76bc6cff00000000000000b8000000000000000000000000000000ec7200af80deb7070d132f509140ad451a315ab23dbaa1eceba20684372f886756934385d802583b0cdfab1045111a2ebaa782cd3382141abaed99740ec265bd542e7ad79947b882ff9bfed684bd82a5526b9a6a16f009a5e54327c0ea1156e26966fba43740aee2db64c6368748e13f558e81154b69c55db4c4a33c189e0cfa09d2477a92e69cb9c942e9f89594b82359d61be92447f9e1f5468cf2a3c175dc0c00000000000000380700000000000000000000000000009fcac400e3038227d48fe53a9ecdcd5ea87c6bf10242f192e3ef4193802661d9a05906a67fc45ca98325ac1f56469e5ccaefdf9757467dc9e07b318defa2f43793a0f46a339905e2883fbd9df49f964b761f58660148b78e25d04f5f3d430f884c7393a1bc7437f2ea06b5b944ba35f5cf11acafea1e44b0ff07e63db48b7875a999246e2ee5e24ec030a345c7ff01c3a7e2b73cc8fe41dc9cea2f2bf286532b2e98bd08786bbc45b146a12c4008cab72bd461a68c97b32764753bd40d1cd866106f8b59afbf9c2d39ab89a852f1e4206f165d84f86650d7a6e95d07646566a978e6a09e87082fa680afc436db5714e4de604155c02beb678d661b523bca634536466aa812084530ec0bd708695afc9977618cd41752fbe87bfaae8b208bfd009c7bcf50067ea2b00b4fe473de5e7467e511fa2340c08d8303c95c7d0d786af9b6dbb1e591f5a5251ee4c3ba8d961d424684a966fef07bc64c15dfd26bc29861393ebf983b711a7e91baca153f8c0f168544e900b89dda8f7edbfcb4af904571d21d343116ba679a73ec800519cd99d40733c4d7c4b514c5c1555f17a43a7e787f13e2267c1b01ca02c00bd618658702ac0c4fc5158c9b0cd7f1f3e74772627cf4e5764d912e9e375f93fda32ba05f5e3e13c7c7668e6aac724ac6b863f974b253f12a783fe5ffc4e5684e1b5b93e03e42c09f239e2307052b3e316a8846f17fface69e73a0452ac529ebcfdbca1c6087d77f54c8477ce7bb834ed175ef8dc12e4e126ea89dbf538011906a895f3d378928318891ae6679b459f0708ccb57a5e8c2c0adb18864d7f26c43e388a9cff63143b172ebedd26513bd3708d8fd07ebd0c0a858d6a81185055324f7da0382140dea52fc1db2d04fe6dd24e4b3ca065af6f8cea69c515465db52bfa52fa4eec1061b2b58b7893844815a47a70a80e042d75fc9df871c9979c047ef254b73a86f597d77ae36e34a9279a521f491a27edd3753fad0c394d7e85128daa37a17c67328ea194606cd5de9d3f46d1b12ea31608f76381f6ac49dd2bdd15908db765bc1b940a2ef37780c19caf159441a1afbe0ed600c8178f5b68b84ccd6a727353fe1c545b75f67eee2cb7218e73ca1a9507d67709d0a40c20a4072741dd3f0943184c2941651e51d9b39c215e206b0dfb9d4c5e33229f914a8ce74a0ad5e25fe09958bece82cb0703eedbe642177902ede236aa7fe42a37030e125c13dcd9e88c69f51e99df9ddf6569934a04be70099d39bebbaef5353f7ddd0f4d52452da9b1074bc069af2b295298492611a907cb6547a2eb129747811db9a22cd95f0807c6504ab11e629ce8ed90e40800515e164f9cbf335670b55489b33ae265675fd6293d73185f4066a914ddfd610f415ac8e6ee3a50c2d2ab1bd470528ac04ceb7ec8771d3cbc3a45abc10e9e813d2c35c836de3c2e7631ab0e784ac45cbbebaca629b26b1a26c6dea42a6740aa3fb5b1e4d5d0f202caa906241d258b4b1e319e6a79f446e93fd0363377cd1652edf941387df56c3e53b9a404519d980470797cfeee39e00cfd57c0c29903b8267b755e29515f932728b5bdcf5aaf407aa240d41ac9f65fada0cb68a1057fc647492b3bd1c49e4dd644846879d59d6aac50ad5364dc15cc42d3370f1ca71823ae545b11e2240f9477cb45c7b277d2bf0e654933a4cac95cde02415624a76ff5769c66eed885835c5537abcc1d013de5160261f19738907a6462184be35887200c30b0a4ff3cd8adff03c8057bef7193295b613ca8b4f74fec054e4a3f9f1c85f70531f4f983f5ec19dab4ac0f435d121d7491e46f4e2b7514a85a9fdfb89fe5167c0506d393fc28aac832002c23b07acd5577562e4c085e93972b15dc03bb64d11cd060418182eca96b357c7f11a2ab2be37bb1a6f5988a776c473025c5ed4dae98b11b2cbdfc10e0d514e71b2b519b8590eee8b1276db3ef9c1e34abfc11d1ceed6c5b6a229f6e697e45d888450da7072489347eea11c78f3c63d5412c71bec8cdbbbb4f012874006473c959a98f622e8437bbf27b7dcd62f9974ccba053b80226df4c21860174dbc22d785932bacb0853764e7a417ba2f635d48b31869487ead5736a8fd0f74c29599858c9c168d473515d5a5507879916ae2ef258133898a4d2632ca1f056e261844dcf68f842485f560d38ba49cea70b7b769d999f2810f66ed2a8330c0d5ecc845eaf2892f2814b7edbdb2f11071487ea2fdb140920128a0eaf403d1c865820664247e94c5545251d084f29b99ebea8e4b0e13e8eaf24e8581844e78432c701a81756a9708949099a455744de281736a7b3b912836bfcdb3a42d2be821a707e98a34351d0875cf0008cd7d45e6889ad39b4794f565b60950165c1b173564f1b49e16726dfc5762e424abaa988e1347157243662a961b5dea4e3600c510fa4f517b667a67be0cd5a43fafa1617e6ae15a72bce7dd9f90115348e4813188f51e77a9d4d61cef041d89728d746a59d391f6069b5ffe1e41729ce633f7e659cff645b76e0692ad346feee0508f76a4c35e5a2da7277d7edb8e5c544"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x11c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:04 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:05 executing program 1: syslog(0x4, &(0x7f0000000000)=""/142, 0xc7d84a7310fde472) 14:16:05 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x0, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:05 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="880000000000000000000000000000004b916a4ab582f1cde43db451c3b73a6e0015ca541800ddc1c87374016070b28f91ed00121a33089b1202ac4469586b5cd7316b0eb7eb4f65c697b62fa22233bb0dc3761c0ec74af621007478380c76fd4819158aa4c8953091c5ee57b6af4d4f23d68a6be5bb5fc153dd91275690c1c210166ef76553251fa6e6ed30320000000000000088000000000000000000000000000000a11c9941c827594636d0ed22245a5a10c105fa9e5fa854034788ffa67a4d0ef0087194bde2c16a8da015cecef8cbedc7a040d56fd2c70294fac6e04fcb06fdf7766d17e065588cf0f6fef64c8b3bdd4e238567d04955c3ed781fdb180d5c918a2bb356872fe273942f735e737e76bc6cff00000000000000b8000000000000000000000000000000ec7200af80deb7070d132f509140ad451a315ab23dbaa1eceba20684372f886756934385d802583b0cdfab1045111a2ebaa782cd3382141abaed99740ec265bd542e7ad79947b882ff9bfed684bd82a5526b9a6a16f009a5e54327c0ea1156e26966fba43740aee2db64c6368748e13f558e81154b69c55db4c4a33c189e0cfa09d2477a92e69cb9c942e9f89594b82359d61be92447f9e1f5468cf2a3c175dc0c00000000000000380700000000000000000000000000009fcac400e3038227d48fe53a9ecdcd5ea87c6bf10242f192e3ef4193802661d9a05906a67fc45ca98325ac1f56469e5ccaefdf9757467dc9e07b318defa2f43793a0f46a339905e2883fbd9df49f964b761f58660148b78e25d04f5f3d430f884c7393a1bc7437f2ea06b5b944ba35f5cf11acafea1e44b0ff07e63db48b7875a999246e2ee5e24ec030a345c7ff01c3a7e2b73cc8fe41dc9cea2f2bf286532b2e98bd08786bbc45b146a12c4008cab72bd461a68c97b32764753bd40d1cd866106f8b59afbf9c2d39ab89a852f1e4206f165d84f86650d7a6e95d07646566a978e6a09e87082fa680afc436db5714e4de604155c02beb678d661b523bca634536466aa812084530ec0bd708695afc9977618cd41752fbe87bfaae8b208bfd009c7bcf50067ea2b00b4fe473de5e7467e511fa2340c08d8303c95c7d0d786af9b6dbb1e591f5a5251ee4c3ba8d961d424684a966fef07bc64c15dfd26bc29861393ebf983b711a7e91baca153f8c0f168544e900b89dda8f7edbfcb4af904571d21d343116ba679a73ec800519cd99d40733c4d7c4b514c5c1555f17a43a7e787f13e2267c1b01ca02c00bd618658702ac0c4fc5158c9b0cd7f1f3e74772627cf4e5764d912e9e375f93fda32ba05f5e3e13c7c7668e6aac724ac6b863f974b253f12a783fe5ffc4e5684e1b5b93e03e42c09f239e2307052b3e316a8846f17fface69e73a0452ac529ebcfdbca1c6087d77f54c8477ce7bb834ed175ef8dc12e4e126ea89dbf538011906a895f3d378928318891ae6679b459f0708ccb57a5e8c2c0adb18864d7f26c43e388a9cff63143b172ebedd26513bd3708d8fd07ebd0c0a858d6a81185055324f7da0382140dea52fc1db2d04fe6dd24e4b3ca065af6f8cea69c515465db52bfa52fa4eec1061b2b58b7893844815a47a70a80e042d75fc9df871c9979c047ef254b73a86f597d77ae36e34a9279a521f491a27edd3753fad0c394d7e85128daa37a17c67328ea194606cd5de9d3f46d1b12ea31608f76381f6ac49dd2bdd15908db765bc1b940a2ef37780c19caf159441a1afbe0ed600c8178f5b68b84ccd6a727353fe1c545b75f67eee2cb7218e73ca1a9507d67709d0a40c20a4072741dd3f0943184c2941651e51d9b39c215e206b0dfb9d4c5e33229f914a8ce74a0ad5e25fe09958bece82cb0703eedbe642177902ede236aa7fe42a37030e125c13dcd9e88c69f51e99df9ddf6569934a04be70099d39bebbaef5353f7ddd0f4d52452da9b1074bc069af2b295298492611a907cb6547a2eb129747811db9a22cd95f0807c6504ab11e629ce8ed90e40800515e164f9cbf335670b55489b33ae265675fd6293d73185f4066a914ddfd610f415ac8e6ee3a50c2d2ab1bd470528ac04ceb7ec8771d3cbc3a45abc10e9e813d2c35c836de3c2e7631ab0e784ac45cbbebaca629b26b1a26c6dea42a6740aa3fb5b1e4d5d0f202caa906241d258b4b1e319e6a79f446e93fd0363377cd1652edf941387df56c3e53b9a404519d980470797cfeee39e00cfd57c0c29903b8267b755e29515f932728b5bdcf5aaf407aa240d41ac9f65fada0cb68a1057fc647492b3bd1c49e4dd644846879d59d6aac50ad5364dc15cc42d3370f1ca71823ae545b11e2240f9477cb45c7b277d2bf0e654933a4cac95cde02415624a76ff5769c66eed885835c5537abcc1d013de5160261f19738907a6462184be35887200c30b0a4ff3cd8adff03c8057bef7193295b613ca8b4f74fec054e4a3f9f1c85f70531f4f983f5ec19dab4ac0f435d121d7491e46f4e2b7514a85a9fdfb89fe5167c0506d393fc28aac832002c23b07acd5577562e4c085e93972b15dc03bb64d11cd060418182eca96b357c7f11a2ab2be37bb1a6f5988a776c473025c5ed4dae98b11b2cbdfc10e0d514e71b2b519b8590eee8b1276db3ef9c1e34abfc11d1ceed6c5b6a229f6e697e45d888450da7072489347eea11c78f3c63d5412c71bec8cdbbbb4f012874006473c959a98f622e8437bbf27b7dcd62f9974ccba053b80226df4c21860174dbc22d785932bacb0853764e7a417ba2f635d48b31869487ead5736a8fd0f74c29599858c9c168d473515d5a5507879916ae2ef258133898a4d2632ca1f056e261844dcf68f842485f560d38ba49cea70b7b769d999f2810f66ed2a8330c0d5ecc845eaf2892f2814b7edbdb2f11071487ea2fdb140920128a0eaf403d1c865820664247e94c5545251d084f29b99ebea8e4b0e13e8eaf24e8581844e78432c701a81756a9708949099a455744de281736a7b3b912836bfcdb3a42d2be821a707e98a34351d0875cf0008cd7d45e6889ad39b4794f565b60950165c1b173564f1b49e16726dfc5762e424abaa988e1347157243662a961b5dea4e3600c510fa4f517b667a67be0cd5a43fafa1617e6ae15a72bce7dd9f90115348e4813188f51e77a9d4d61cef041d89728d746a59d391f6069b5ffe1e41729ce633f7e659cff645b76e0692ad346feee0508f76a4c35e5a2da7277d7edb8e5c544"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd645413be450000000000000001c122283846253398a04d99ca8680deb20632834bc027c44d4cf3fd102724d6748de61eebb06801048dea7636f3", 0x11c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:05 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x0, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:05 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x0, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:05 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:05 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000005240)="ff", 0x1) tee(r3, r1, 0x2, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x367a38a1) 14:16:05 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x125) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:05 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:05 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:05 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x125) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:05 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:05 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:05 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x0, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:05 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x125) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:05 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:05 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="880000000000000000000000000000004b916a4ab582f1cde43db451c3b73a6e0015ca541800ddc1c87374016070b28f91ed00121a33089b1202ac4469586b5cd7316b0eb7eb4f65c697b62fa22233bb0dc3761c0ec74af621007478380c76fd4819158aa4c8953091c5ee57b6af4d4f23d68a6be5bb5fc153dd91275690c1c210166ef76553251fa6e6ed30320000000000000088000000000000000000000000000000a11c9941c827594636d0ed22245a5a10c105fa9e5fa854034788ffa67a4d0ef0087194bde2c16a8da015cecef8cbedc7a040d56fd2c70294fac6e04fcb06fdf7766d17e065588cf0f6fef64c8b3bdd4e238567d04955c3ed781fdb180d5c918a2bb356872fe273942f735e737e76bc6cff00000000000000b8000000000000000000000000000000ec7200af80deb7070d132f509140ad451a315ab23dbaa1eceba20684372f886756934385d802583b0cdfab1045111a2ebaa782cd3382141abaed99740ec265bd542e7ad79947b882ff9bfed684bd82a5526b9a6a16f009a5e54327c0ea1156e26966fba43740aee2db64c6368748e13f558e81154b69c55db4c4a33c189e0cfa09d2477a92e69cb9c942e9f89594b82359d61be92447f9e1f5468cf2a3c175dc0c00000000000000380700000000000000000000000000009fcac400e3038227d48fe53a9ecdcd5ea87c6bf10242f192e3ef4193802661d9a05906a67fc45ca98325ac1f56469e5ccaefdf9757467dc9e07b318defa2f43793a0f46a339905e2883fbd9df49f964b761f58660148b78e25d04f5f3d430f884c7393a1bc7437f2ea06b5b944ba35f5cf11acafea1e44b0ff07e63db48b7875a999246e2ee5e24ec030a345c7ff01c3a7e2b73cc8fe41dc9cea2f2bf286532b2e98bd08786bbc45b146a12c4008cab72bd461a68c97b32764753bd40d1cd866106f8b59afbf9c2d39ab89a852f1e4206f165d84f86650d7a6e95d07646566a978e6a09e87082fa680afc436db5714e4de604155c02beb678d661b523bca634536466aa812084530ec0bd708695afc9977618cd41752fbe87bfaae8b208bfd009c7bcf50067ea2b00b4fe473de5e7467e511fa2340c08d8303c95c7d0d786af9b6dbb1e591f5a5251ee4c3ba8d961d424684a966fef07bc64c15dfd26bc29861393ebf983b711a7e91baca153f8c0f168544e900b89dda8f7edbfcb4af904571d21d343116ba679a73ec800519cd99d40733c4d7c4b514c5c1555f17a43a7e787f13e2267c1b01ca02c00bd618658702ac0c4fc5158c9b0cd7f1f3e74772627cf4e5764d912e9e375f93fda32ba05f5e3e13c7c7668e6aac724ac6b863f974b253f12a783fe5ffc4e5684e1b5b93e03e42c09f239e2307052b3e316a8846f17fface69e73a0452ac529ebcfdbca1c6087d77f54c8477ce7bb834ed175ef8dc12e4e126ea89dbf538011906a895f3d378928318891ae6679b459f0708ccb57a5e8c2c0adb18864d7f26c43e388a9cff63143b172ebedd26513bd3708d8fd07ebd0c0a858d6a81185055324f7da0382140dea52fc1db2d04fe6dd24e4b3ca065af6f8cea69c515465db52bfa52fa4eec1061b2b58b7893844815a47a70a80e042d75fc9df871c9979c047ef254b73a86f597d77ae36e34a9279a521f491a27edd3753fad0c394d7e85128daa37a17c67328ea194606cd5de9d3f46d1b12ea31608f76381f6ac49dd2bdd15908db765bc1b940a2ef37780c19caf159441a1afbe0ed600c8178f5b68b84ccd6a727353fe1c545b75f67eee2cb7218e73ca1a9507d67709d0a40c20a4072741dd3f0943184c2941651e51d9b39c215e206b0dfb9d4c5e33229f914a8ce74a0ad5e25fe09958bece82cb0703eedbe642177902ede236aa7fe42a37030e125c13dcd9e88c69f51e99df9ddf6569934a04be70099d39bebbaef5353f7ddd0f4d52452da9b1074bc069af2b295298492611a907cb6547a2eb129747811db9a22cd95f0807c6504ab11e629ce8ed90e40800515e164f9cbf335670b55489b33ae265675fd6293d73185f4066a914ddfd610f415ac8e6ee3a50c2d2ab1bd470528ac04ceb7ec8771d3cbc3a45abc10e9e813d2c35c836de3c2e7631ab0e784ac45cbbebaca629b26b1a26c6dea42a6740aa3fb5b1e4d5d0f202caa906241d258b4b1e319e6a79f446e93fd0363377cd1652edf941387df56c3e53b9a404519d980470797cfeee39e00cfd57c0c29903b8267b755e29515f932728b5bdcf5aaf407aa240d41ac9f65fada0cb68a1057fc647492b3bd1c49e4dd644846879d59d6aac50ad5364dc15cc42d3370f1ca71823ae545b11e2240f9477cb45c7b277d2bf0e654933a4cac95cde02415624a76ff5769c66eed885835c5537abcc1d013de5160261f19738907a6462184be35887200c30b0a4ff3cd8adff03c8057bef7193295b613ca8b4f74fec054e4a3f9f1c85f70531f4f983f5ec19dab4ac0f435d121d7491e46f4e2b7514a85a9fdfb89fe5167c0506d393fc28aac832002c23b07acd5577562e4c085e93972b15dc03bb64d11cd060418182eca96b357c7f11a2ab2be37bb1a6f5988a776c473025c5ed4dae98b11b2cbdfc10e0d514e71b2b519b8590eee8b1276db3ef9c1e34abfc11d1ceed6c5b6a229f6e697e45d888450da7072489347eea11c78f3c63d5412c71bec8cdbbbb4f012874006473c959a98f622e8437bbf27b7dcd62f9974ccba053b80226df4c21860174dbc22d785932bacb0853764e7a417ba2f635d48b31869487ead5736a8fd0f74c29599858c9c168d473515d5a5507879916ae2ef258133898a4d2632ca1f056e261844dcf68f842485f560d38ba49cea70b7b769d999f2810f66ed2a8330c0d5ecc845eaf2892f2814b7edbdb2f11071487ea2fdb140920128a0eaf403d1c865820664247e94c5545251d084f29b99ebea8e4b0e13e8eaf24e8581844e78432c701a81756a9708949099a455744de281736a7b3b912836bfcdb3a42d2be821a707e98a34351d0875cf0008cd7d45e6889ad39b4794f565b60950165c1b173564f1b49e16726dfc5762e424abaa988e1347157243662a961b5dea4e3600c510fa4f517b667a67be0cd5a43fafa1617e6ae15a72bce7dd9f90115348e4813188f51e77a9d4d61cef041d89728d746a59d391f6069b5ffe1e41729ce633f7e659cff645b76e0692ad346feee0508f76a4c35e5a2da7277d7edb8e5c544"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12a) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:05 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x0, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:06 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd645413be450000000000000001c122283846253398a04d99ca8680deb20632834bc027c44d4cf3fd102724d6748de61eebb06801048dea7636f3a248a9bf3123882ca9fc66b4e70b", 0x12a) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:06 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:06 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:06 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12a) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:06 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x0, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:06 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:06 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:06 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:06 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="880000000000000000000000000000004b916a4ab582f1cde43db451c3b73a6e0015ca541800ddc1c87374016070b28f91ed00121a33089b1202ac4469586b5cd7316b0eb7eb4f65c697b62fa22233bb0dc3761c0ec74af621007478380c76fd4819158aa4c8953091c5ee57b6af4d4f23d68a6be5bb5fc153dd91275690c1c210166ef76553251fa6e6ed30320000000000000088000000000000000000000000000000a11c9941c827594636d0ed22245a5a10c105fa9e5fa854034788ffa67a4d0ef0087194bde2c16a8da015cecef8cbedc7a040d56fd2c70294fac6e04fcb06fdf7766d17e065588cf0f6fef64c8b3bdd4e238567d04955c3ed781fdb180d5c918a2bb356872fe273942f735e737e76bc6cff00000000000000b8000000000000000000000000000000ec7200af80deb7070d132f509140ad451a315ab23dbaa1eceba20684372f886756934385d802583b0cdfab1045111a2ebaa782cd3382141abaed99740ec265bd542e7ad79947b882ff9bfed684bd82a5526b9a6a16f009a5e54327c0ea1156e26966fba43740aee2db64c6368748e13f558e81154b69c55db4c4a33c189e0cfa09d2477a92e69cb9c942e9f89594b82359d61be92447f9e1f5468cf2a3c175dc0c00000000000000380700000000000000000000000000009fcac400e3038227d48fe53a9ecdcd5ea87c6bf10242f192e3ef4193802661d9a05906a67fc45ca98325ac1f56469e5ccaefdf9757467dc9e07b318defa2f43793a0f46a339905e2883fbd9df49f964b761f58660148b78e25d04f5f3d430f884c7393a1bc7437f2ea06b5b944ba35f5cf11acafea1e44b0ff07e63db48b7875a999246e2ee5e24ec030a345c7ff01c3a7e2b73cc8fe41dc9cea2f2bf286532b2e98bd08786bbc45b146a12c4008cab72bd461a68c97b32764753bd40d1cd866106f8b59afbf9c2d39ab89a852f1e4206f165d84f86650d7a6e95d07646566a978e6a09e87082fa680afc436db5714e4de604155c02beb678d661b523bca634536466aa812084530ec0bd708695afc9977618cd41752fbe87bfaae8b208bfd009c7bcf50067ea2b00b4fe473de5e7467e511fa2340c08d8303c95c7d0d786af9b6dbb1e591f5a5251ee4c3ba8d961d424684a966fef07bc64c15dfd26bc29861393ebf983b711a7e91baca153f8c0f168544e900b89dda8f7edbfcb4af904571d21d343116ba679a73ec800519cd99d40733c4d7c4b514c5c1555f17a43a7e787f13e2267c1b01ca02c00bd618658702ac0c4fc5158c9b0cd7f1f3e74772627cf4e5764d912e9e375f93fda32ba05f5e3e13c7c7668e6aac724ac6b863f974b253f12a783fe5ffc4e5684e1b5b93e03e42c09f239e2307052b3e316a8846f17fface69e73a0452ac529ebcfdbca1c6087d77f54c8477ce7bb834ed175ef8dc12e4e126ea89dbf538011906a895f3d378928318891ae6679b459f0708ccb57a5e8c2c0adb18864d7f26c43e388a9cff63143b172ebedd26513bd3708d8fd07ebd0c0a858d6a81185055324f7da0382140dea52fc1db2d04fe6dd24e4b3ca065af6f8cea69c515465db52bfa52fa4eec1061b2b58b7893844815a47a70a80e042d75fc9df871c9979c047ef254b73a86f597d77ae36e34a9279a521f491a27edd3753fad0c394d7e85128daa37a17c67328ea194606cd5de9d3f46d1b12ea31608f76381f6ac49dd2bdd15908db765bc1b940a2ef37780c19caf159441a1afbe0ed600c8178f5b68b84ccd6a727353fe1c545b75f67eee2cb7218e73ca1a9507d67709d0a40c20a4072741dd3f0943184c2941651e51d9b39c215e206b0dfb9d4c5e33229f914a8ce74a0ad5e25fe09958bece82cb0703eedbe642177902ede236aa7fe42a37030e125c13dcd9e88c69f51e99df9ddf6569934a04be70099d39bebbaef5353f7ddd0f4d52452da9b1074bc069af2b295298492611a907cb6547a2eb129747811db9a22cd95f0807c6504ab11e629ce8ed90e40800515e164f9cbf335670b55489b33ae265675fd6293d73185f4066a914ddfd610f415ac8e6ee3a50c2d2ab1bd470528ac04ceb7ec8771d3cbc3a45abc10e9e813d2c35c836de3c2e7631ab0e784ac45cbbebaca629b26b1a26c6dea42a6740aa3fb5b1e4d5d0f202caa906241d258b4b1e319e6a79f446e93fd0363377cd1652edf941387df56c3e53b9a404519d980470797cfeee39e00cfd57c0c29903b8267b755e29515f932728b5bdcf5aaf407aa240d41ac9f65fada0cb68a1057fc647492b3bd1c49e4dd644846879d59d6aac50ad5364dc15cc42d3370f1ca71823ae545b11e2240f9477cb45c7b277d2bf0e654933a4cac95cde02415624a76ff5769c66eed885835c5537abcc1d013de5160261f19738907a6462184be35887200c30b0a4ff3cd8adff03c8057bef7193295b613ca8b4f74fec054e4a3f9f1c85f70531f4f983f5ec19dab4ac0f435d121d7491e46f4e2b7514a85a9fdfb89fe5167c0506d393fc28aac832002c23b07acd5577562e4c085e93972b15dc03bb64d11cd060418182eca96b357c7f11a2ab2be37bb1a6f5988a776c473025c5ed4dae98b11b2cbdfc10e0d514e71b2b519b8590eee8b1276db3ef9c1e34abfc11d1ceed6c5b6a229f6e697e45d888450da7072489347eea11c78f3c63d5412c71bec8cdbbbb4f012874006473c959a98f622e8437bbf27b7dcd62f9974ccba053b80226df4c21860174dbc22d785932bacb0853764e7a417ba2f635d48b31869487ead5736a8fd0f74c29599858c9c168d473515d5a5507879916ae2ef258133898a4d2632ca1f056e261844dcf68f842485f560d38ba49cea70b7b769d999f2810f66ed2a8330c0d5ecc845eaf2892f2814b7edbdb2f11071487ea2fdb140920128a0eaf403d1c865820664247e94c5545251d084f29b99ebea8e4b0e13e8eaf24e8581844e78432c701a81756a9708949099a455744de281736a7b3b912836bfcdb3a42d2be821a707e98a34351d0875cf0008cd7d45e6889ad39b4794f565b60950165c1b173564f1b49e16726dfc5762e424abaa988e1347157243662a961b5dea4e3600c510fa4f517b667a67be0cd5a43fafa1617e6ae15a72bce7dd9f90115348e4813188f51e77a9d4d61cef041d89728d746a59d391f6069b5ffe1e41729ce633f7e659cff645b76e0692ad346feee0508f76a4c35e5a2da7277d7edb8e5c544"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:06 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:06 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:06 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd645413be450000000000000001c122283846253398a04d99ca8680deb20632834bc027c44d4cf3fd102724d6748de61eebb06801048dea7636f3a248a9bf3123882ca9fc66b4e70b06d4", 0x12c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:06 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x0, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:06 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:06 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:06 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12d) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:06 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:06 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12d) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:06 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:07 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:07 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12d) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:07 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:07 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:07 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 803.987652][ C1] net_ratelimit: 31 callbacks suppressed [ 803.987659][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 803.999146][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:16:07 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:07 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:07 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:07 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:07 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:07 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:07 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:07 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:07 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd645413be450000000000000001c122283846253398a04d99ca8680deb20632834bc027c44d4cf3fd102724d6748de61eebb06801048dea7636f3a248a9bf3123882ca9fc66b4e70b06d43045", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:07 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:07 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:07 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:07 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:07 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:08 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd645413be450000000000000001c122283846253398a04d99ca8680deb20632834bc027c44d4cf3fd102724d6748de61eebb06801048dea7636f3a248a9bf3123882ca9fc66b4e70b06d43045", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:08 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:08 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:08 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:08 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:08 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:08 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) [ 805.188035][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 805.194232][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:16:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:08 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:08 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:08 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x0, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 805.507670][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 805.513509][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 805.518009][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 805.519341][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 805.525206][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 805.530708][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:16:08 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:09 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd645413be450000000000000001c122283846253398a04d99ca8680deb20632834bc027c44d4cf3fd102724d6748de61eebb06801048dea7636f3a248a9bf3123882ca9fc66b4e70b06d43045", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:09 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:09 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:09 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:09 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x0, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:09 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:09 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:09 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:09 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x0, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:09 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd645413be450000000000000001c122283846253398a04d99ca8680deb20632834bc027c44d4cf3fd102724d6748de61eebb06801048dea7636f3a248a9bf3123882ca9fc66b4e70b06d43045", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:09 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:09 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:09 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:09 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:09 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:09 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:09 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:10 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:10 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="880000000000000000000000000000004b916a4ab582f1cde43db451c3b73a6e0015ca541800ddc1c87374016070b28f91ed00121a33089b1202ac4469586b5cd7316b0eb7eb4f65c697b62fa22233bb0dc3761c0ec74af621007478380c76fd4819158aa4c8953091c5ee57b6af4d4f23d68a6be5bb5fc153dd91275690c1c210166ef76553251fa6e6ed30320000000000000088000000000000000000000000000000a11c9941c827594636d0ed22245a5a10c105fa9e5fa854034788ffa67a4d0ef0087194bde2c16a8da015cecef8cbedc7a040d56fd2c70294fac6e04fcb06fdf7766d17e065588cf0f6fef64c8b3bdd4e238567d04955c3ed781fdb180d5c918a2bb356872fe273942f735e737e76bc6cff00000000000000b8000000000000000000000000000000ec7200af80deb7070d132f509140ad451a315ab23dbaa1eceba20684372f886756934385d802583b0cdfab1045111a2ebaa782cd3382141abaed99740ec265bd542e7ad79947b882ff9bfed684bd82a5526b9a6a16f009a5e54327c0ea1156e26966fba43740aee2db64c6368748e13f558e81154b69c55db4c4a33c189e0cfa09d2477a92e69cb9c942e9f89594b82359d61be92447f9e1f5468cf2a3c175dc0c00000000000000380700000000000000000000000000009fcac400e3038227d48fe53a9ecdcd5ea87c6bf10242f192e3ef4193802661d9a05906a67fc45ca98325ac1f56469e5ccaefdf9757467dc9e07b318defa2f43793a0f46a339905e2883fbd9df49f964b761f58660148b78e25d04f5f3d430f884c7393a1bc7437f2ea06b5b944ba35f5cf11acafea1e44b0ff07e63db48b7875a999246e2ee5e24ec030a345c7ff01c3a7e2b73cc8fe41dc9cea2f2bf286532b2e98bd08786bbc45b146a12c4008cab72bd461a68c97b32764753bd40d1cd866106f8b59afbf9c2d39ab89a852f1e4206f165d84f86650d7a6e95d07646566a978e6a09e87082fa680afc436db5714e4de604155c02beb678d661b523bca634536466aa812084530ec0bd708695afc9977618cd41752fbe87bfaae8b208bfd009c7bcf50067ea2b00b4fe473de5e7467e511fa2340c08d8303c95c7d0d786af9b6dbb1e591f5a5251ee4c3ba8d961d424684a966fef07bc64c15dfd26bc29861393ebf983b711a7e91baca153f8c0f168544e900b89dda8f7edbfcb4af904571d21d343116ba679a73ec800519cd99d40733c4d7c4b514c5c1555f17a43a7e787f13e2267c1b01ca02c00bd618658702ac0c4fc5158c9b0cd7f1f3e74772627cf4e5764d912e9e375f93fda32ba05f5e3e13c7c7668e6aac724ac6b863f974b253f12a783fe5ffc4e5684e1b5b93e03e42c09f239e2307052b3e316a8846f17fface69e73a0452ac529ebcfdbca1c6087d77f54c8477ce7bb834ed175ef8dc12e4e126ea89dbf538011906a895f3d378928318891ae6679b459f0708ccb57a5e8c2c0adb18864d7f26c43e388a9cff63143b172ebedd26513bd3708d8fd07ebd0c0a858d6a81185055324f7da0382140dea52fc1db2d04fe6dd24e4b3ca065af6f8cea69c515465db52bfa52fa4eec1061b2b58b7893844815a47a70a80e042d75fc9df871c9979c047ef254b73a86f597d77ae36e34a9279a521f491a27edd3753fad0c394d7e85128daa37a17c67328ea194606cd5de9d3f46d1b12ea31608f76381f6ac49dd2bdd15908db765bc1b940a2ef37780c19caf159441a1afbe0ed600c8178f5b68b84ccd6a727353fe1c545b75f67eee2cb7218e73ca1a9507d67709d0a40c20a4072741dd3f0943184c2941651e51d9b39c215e206b0dfb9d4c5e33229f914a8ce74a0ad5e25fe09958bece82cb0703eedbe642177902ede236aa7fe42a37030e125c13dcd9e88c69f51e99df9ddf6569934a04be70099d39bebbaef5353f7ddd0f4d52452da9b1074bc069af2b295298492611a907cb6547a2eb129747811db9a22cd95f0807c6504ab11e629ce8ed90e40800515e164f9cbf335670b55489b33ae265675fd6293d73185f4066a914ddfd610f415ac8e6ee3a50c2d2ab1bd470528ac04ceb7ec8771d3cbc3a45abc10e9e813d2c35c836de3c2e7631ab0e784ac45cbbebaca629b26b1a26c6dea42a6740aa3fb5b1e4d5d0f202caa906241d258b4b1e319e6a79f446e93fd0363377cd1652edf941387df56c3e53b9a404519d980470797cfeee39e00cfd57c0c29903b8267b755e29515f932728b5bdcf5aaf407aa240d41ac9f65fada0cb68a1057fc647492b3bd1c49e4dd644846879d59d6aac50ad5364dc15cc42d3370f1ca71823ae545b11e2240f9477cb45c7b277d2bf0e654933a4cac95cde02415624a76ff5769c66eed885835c5537abcc1d013de5160261f19738907a6462184be35887200c30b0a4ff3cd8adff03c8057bef7193295b613ca8b4f74fec054e4a3f9f1c85f70531f4f983f5ec19dab4ac0f435d121d7491e46f4e2b7514a85a9fdfb89fe5167c0506d393fc28aac832002c23b07acd5577562e4c085e93972b15dc03bb64d11cd060418182eca96b357c7f11a2ab2be37bb1a6f5988a776c473025c5ed4dae98b11b2cbdfc10e0d514e71b2b519b8590eee8b1276db3ef9c1e34abfc11d1ceed6c5b6a229f6e697e45d888450da7072489347eea11c78f3c63d5412c71bec8cdbbbb4f012874006473c959a98f622e8437bbf27b7dcd62f9974ccba053b80226df4c21860174dbc22d785932bacb0853764e7a417ba2f635d48b31869487ead5736a8fd0f74c29599858c9c168d473515d5a5507879916ae2ef258133898a4d2632ca1f056e261844dcf68f842485f560d38ba49cea70b7b769d999f2810f66ed2a8330c0d5ecc845eaf2892f2814b7edbdb2f11071487ea2fdb140920128a0eaf403d1c865820664247e94c5545251d084f29b99ebea8e4b0e13e8eaf24e8581844e78432c701a81756a9708949099a455744de281736a7b3b912836bfcdb3a42d2be821a707e98a34351d0875cf0008cd7d45e6889ad39b4794f565b60950165c1b173564f1b49e16726dfc5762e424abaa988e1347157243662a961b5dea4e3600c510fa4f517b667a67be0cd5a43fafa1617e6ae15a72bce7dd9f90115348e4813188f51e77a9d4d61cef041d89728d746a59d391f6069b5ffe1e41729ce633f7e659cff645b76e0692ad346feee0508f76a4c35e5a2da7277d7edb8e5c544"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd645413be450000000000000001c122283846253398a04d99ca8680deb20632834bc027c44d4cf3fd102724d6748de61eebb06801048dea7636f3a248a9bf3123882ca9fc66b4e70b06d43045", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000), 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:10 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:10 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:10 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:10 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:10 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="880000000000000000000000000000004b916a4ab582f1cde43db451c3b73a6e0015ca541800ddc1c87374016070b28f91ed00121a33089b1202ac4469586b5cd7316b0eb7eb4f65c697b62fa22233bb0dc3761c0ec74af621007478380c76fd4819158aa4c8953091c5ee57b6af4d4f23d68a6be5bb5fc153dd91275690c1c210166ef76553251fa6e6ed30320000000000000088000000000000000000000000000000a11c9941c827594636d0ed22245a5a10c105fa9e5fa854034788ffa67a4d0ef0087194bde2c16a8da015cecef8cbedc7a040d56fd2c70294fac6e04fcb06fdf7766d17e065588cf0f6fef64c8b3bdd4e238567d04955c3ed781fdb180d5c918a2bb356872fe273942f735e737e76bc6cff00000000000000b8000000000000000000000000000000ec7200af80deb7070d132f509140ad451a315ab23dbaa1eceba20684372f886756934385d802583b0cdfab1045111a2ebaa782cd3382141abaed99740ec265bd542e7ad79947b882ff9bfed684bd82a5526b9a6a16f009a5e54327c0ea1156e26966fba43740aee2db64c6368748e13f558e81154b69c55db4c4a33c189e0cfa09d2477a92e69cb9c942e9f89594b82359d61be92447f9e1f5468cf2a3c175dc0c00000000000000380700000000000000000000000000009fcac400e3038227d48fe53a9ecdcd5ea87c6bf10242f192e3ef4193802661d9a05906a67fc45ca98325ac1f56469e5ccaefdf9757467dc9e07b318defa2f43793a0f46a339905e2883fbd9df49f964b761f58660148b78e25d04f5f3d430f884c7393a1bc7437f2ea06b5b944ba35f5cf11acafea1e44b0ff07e63db48b7875a999246e2ee5e24ec030a345c7ff01c3a7e2b73cc8fe41dc9cea2f2bf286532b2e98bd08786bbc45b146a12c4008cab72bd461a68c97b32764753bd40d1cd866106f8b59afbf9c2d39ab89a852f1e4206f165d84f86650d7a6e95d07646566a978e6a09e87082fa680afc436db5714e4de604155c02beb678d661b523bca634536466aa812084530ec0bd708695afc9977618cd41752fbe87bfaae8b208bfd009c7bcf50067ea2b00b4fe473de5e7467e511fa2340c08d8303c95c7d0d786af9b6dbb1e591f5a5251ee4c3ba8d961d424684a966fef07bc64c15dfd26bc29861393ebf983b711a7e91baca153f8c0f168544e900b89dda8f7edbfcb4af904571d21d343116ba679a73ec800519cd99d40733c4d7c4b514c5c1555f17a43a7e787f13e2267c1b01ca02c00bd618658702ac0c4fc5158c9b0cd7f1f3e74772627cf4e5764d912e9e375f93fda32ba05f5e3e13c7c7668e6aac724ac6b863f974b253f12a783fe5ffc4e5684e1b5b93e03e42c09f239e2307052b3e316a8846f17fface69e73a0452ac529ebcfdbca1c6087d77f54c8477ce7bb834ed175ef8dc12e4e126ea89dbf538011906a895f3d378928318891ae6679b459f0708ccb57a5e8c2c0adb18864d7f26c43e388a9cff63143b172ebedd26513bd3708d8fd07ebd0c0a858d6a81185055324f7da0382140dea52fc1db2d04fe6dd24e4b3ca065af6f8cea69c515465db52bfa52fa4eec1061b2b58b7893844815a47a70a80e042d75fc9df871c9979c047ef254b73a86f597d77ae36e34a9279a521f491a27edd3753fad0c394d7e85128daa37a17c67328ea194606cd5de9d3f46d1b12ea31608f76381f6ac49dd2bdd15908db765bc1b940a2ef37780c19caf159441a1afbe0ed600c8178f5b68b84ccd6a727353fe1c545b75f67eee2cb7218e73ca1a9507d67709d0a40c20a4072741dd3f0943184c2941651e51d9b39c215e206b0dfb9d4c5e33229f914a8ce74a0ad5e25fe09958bece82cb0703eedbe642177902ede236aa7fe42a37030e125c13dcd9e88c69f51e99df9ddf6569934a04be70099d39bebbaef5353f7ddd0f4d52452da9b1074bc069af2b295298492611a907cb6547a2eb129747811db9a22cd95f0807c6504ab11e629ce8ed90e40800515e164f9cbf335670b55489b33ae265675fd6293d73185f4066a914ddfd610f415ac8e6ee3a50c2d2ab1bd470528ac04ceb7ec8771d3cbc3a45abc10e9e813d2c35c836de3c2e7631ab0e784ac45cbbebaca629b26b1a26c6dea42a6740aa3fb5b1e4d5d0f202caa906241d258b4b1e319e6a79f446e93fd0363377cd1652edf941387df56c3e53b9a404519d980470797cfeee39e00cfd57c0c29903b8267b755e29515f932728b5bdcf5aaf407aa240d41ac9f65fada0cb68a1057fc647492b3bd1c49e4dd644846879d59d6aac50ad5364dc15cc42d3370f1ca71823ae545b11e2240f9477cb45c7b277d2bf0e654933a4cac95cde02415624a76ff5769c66eed885835c5537abcc1d013de5160261f19738907a6462184be35887200c30b0a4ff3cd8adff03c8057bef7193295b613ca8b4f74fec054e4a3f9f1c85f70531f4f983f5ec19dab4ac0f435d121d7491e46f4e2b7514a85a9fdfb89fe5167c0506d393fc28aac832002c23b07acd5577562e4c085e93972b15dc03bb64d11cd060418182eca96b357c7f11a2ab2be37bb1a6f5988a776c473025c5ed4dae98b11b2cbdfc10e0d514e71b2b519b8590eee8b1276db3ef9c1e34abfc11d1ceed6c5b6a229f6e697e45d888450da7072489347eea11c78f3c63d5412c71bec8cdbbbb4f012874006473c959a98f622e8437bbf27b7dcd62f9974ccba053b80226df4c21860174dbc22d785932bacb0853764e7a417ba2f635d48b31869487ead5736a8fd0f74c29599858c9c168d473515d5a5507879916ae2ef258133898a4d2632ca1f056e261844dcf68f842485f560d38ba49cea70b7b769d999f2810f66ed2a8330c0d5ecc845eaf2892f2814b7edbdb2f11071487ea2fdb140920128a0eaf403d1c865820664247e94c5545251d084f29b99ebea8e4b0e13e8eaf24e8581844e78432c701a81756a9708949099a455744de281736a7b3b912836bfcdb3a42d2be821a707e98a34351d0875cf0008cd7d45e6889ad39b4794f565b60950165c1b173564f1b49e16726dfc5762e424abaa988e1347157243662a961b5dea4e3600c510fa4f517b667a67be0cd5a43fafa1617e6ae15a72bce7dd9f90115348e4813188f51e77a9d4d61cef041d89728d746a59d391f6069b5ffe1e41729ce633f7e659cff645b76e0692ad346feee0508f76a4c35e5a2da7277d7edb8e5c544"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000), 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:10 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:10 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:10 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:10 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000), 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:10 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:10 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:10 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:10 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:10 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:10 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:10 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:10 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:10 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd645413be450000000000000001c122283846253398a04d99ca8680deb20632834bc027c44d4cf3fd102724d6748de61eebb06801048dea7636f3a248a9bf3123882ca9fc66b4e70b06d43045", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001fde), 0x4) 14:16:10 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:10 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000001fde), 0x4) 14:16:10 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:11 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:11 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000001fde), 0x4) 14:16:11 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:11 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:11 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:11 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:11 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="880000000000000000000000000000004b916a4ab582f1cde43db451c3b73a6e0015ca541800ddc1c87374016070b28f91ed00121a33089b1202ac4469586b5cd7316b0eb7eb4f65c697b62fa22233bb0dc3761c0ec74af621007478380c76fd4819158aa4c8953091c5ee57b6af4d4f23d68a6be5bb5fc153dd91275690c1c210166ef76553251fa6e6ed30320000000000000088000000000000000000000000000000a11c9941c827594636d0ed22245a5a10c105fa9e5fa854034788ffa67a4d0ef0087194bde2c16a8da015cecef8cbedc7a040d56fd2c70294fac6e04fcb06fdf7766d17e065588cf0f6fef64c8b3bdd4e238567d04955c3ed781fdb180d5c918a2bb356872fe273942f735e737e76bc6cff00000000000000b8000000000000000000000000000000ec7200af80deb7070d132f509140ad451a315ab23dbaa1eceba20684372f886756934385d802583b0cdfab1045111a2ebaa782cd3382141abaed99740ec265bd542e7ad79947b882ff9bfed684bd82a5526b9a6a16f009a5e54327c0ea1156e26966fba43740aee2db64c6368748e13f558e81154b69c55db4c4a33c189e0cfa09d2477a92e69cb9c942e9f89594b82359d61be92447f9e1f5468cf2a3c175dc0c00000000000000380700000000000000000000000000009fcac400e3038227d48fe53a9ecdcd5ea87c6bf10242f192e3ef4193802661d9a05906a67fc45ca98325ac1f56469e5ccaefdf9757467dc9e07b318defa2f43793a0f46a339905e2883fbd9df49f964b761f58660148b78e25d04f5f3d430f884c7393a1bc7437f2ea06b5b944ba35f5cf11acafea1e44b0ff07e63db48b7875a999246e2ee5e24ec030a345c7ff01c3a7e2b73cc8fe41dc9cea2f2bf286532b2e98bd08786bbc45b146a12c4008cab72bd461a68c97b32764753bd40d1cd866106f8b59afbf9c2d39ab89a852f1e4206f165d84f86650d7a6e95d07646566a978e6a09e87082fa680afc436db5714e4de604155c02beb678d661b523bca634536466aa812084530ec0bd708695afc9977618cd41752fbe87bfaae8b208bfd009c7bcf50067ea2b00b4fe473de5e7467e511fa2340c08d8303c95c7d0d786af9b6dbb1e591f5a5251ee4c3ba8d961d424684a966fef07bc64c15dfd26bc29861393ebf983b711a7e91baca153f8c0f168544e900b89dda8f7edbfcb4af904571d21d343116ba679a73ec800519cd99d40733c4d7c4b514c5c1555f17a43a7e787f13e2267c1b01ca02c00bd618658702ac0c4fc5158c9b0cd7f1f3e74772627cf4e5764d912e9e375f93fda32ba05f5e3e13c7c7668e6aac724ac6b863f974b253f12a783fe5ffc4e5684e1b5b93e03e42c09f239e2307052b3e316a8846f17fface69e73a0452ac529ebcfdbca1c6087d77f54c8477ce7bb834ed175ef8dc12e4e126ea89dbf538011906a895f3d378928318891ae6679b459f0708ccb57a5e8c2c0adb18864d7f26c43e388a9cff63143b172ebedd26513bd3708d8fd07ebd0c0a858d6a81185055324f7da0382140dea52fc1db2d04fe6dd24e4b3ca065af6f8cea69c515465db52bfa52fa4eec1061b2b58b7893844815a47a70a80e042d75fc9df871c9979c047ef254b73a86f597d77ae36e34a9279a521f491a27edd3753fad0c394d7e85128daa37a17c67328ea194606cd5de9d3f46d1b12ea31608f76381f6ac49dd2bdd15908db765bc1b940a2ef37780c19caf159441a1afbe0ed600c8178f5b68b84ccd6a727353fe1c545b75f67eee2cb7218e73ca1a9507d67709d0a40c20a4072741dd3f0943184c2941651e51d9b39c215e206b0dfb9d4c5e33229f914a8ce74a0ad5e25fe09958bece82cb0703eedbe642177902ede236aa7fe42a37030e125c13dcd9e88c69f51e99df9ddf6569934a04be70099d39bebbaef5353f7ddd0f4d52452da9b1074bc069af2b295298492611a907cb6547a2eb129747811db9a22cd95f0807c6504ab11e629ce8ed90e40800515e164f9cbf335670b55489b33ae265675fd6293d73185f4066a914ddfd610f415ac8e6ee3a50c2d2ab1bd470528ac04ceb7ec8771d3cbc3a45abc10e9e813d2c35c836de3c2e7631ab0e784ac45cbbebaca629b26b1a26c6dea42a6740aa3fb5b1e4d5d0f202caa906241d258b4b1e319e6a79f446e93fd0363377cd1652edf941387df56c3e53b9a404519d980470797cfeee39e00cfd57c0c29903b8267b755e29515f932728b5bdcf5aaf407aa240d41ac9f65fada0cb68a1057fc647492b3bd1c49e4dd644846879d59d6aac50ad5364dc15cc42d3370f1ca71823ae545b11e2240f9477cb45c7b277d2bf0e654933a4cac95cde02415624a76ff5769c66eed885835c5537abcc1d013de5160261f19738907a6462184be35887200c30b0a4ff3cd8adff03c8057bef7193295b613ca8b4f74fec054e4a3f9f1c85f70531f4f983f5ec19dab4ac0f435d121d7491e46f4e2b7514a85a9fdfb89fe5167c0506d393fc28aac832002c23b07acd5577562e4c085e93972b15dc03bb64d11cd060418182eca96b357c7f11a2ab2be37bb1a6f5988a776c473025c5ed4dae98b11b2cbdfc10e0d514e71b2b519b8590eee8b1276db3ef9c1e34abfc11d1ceed6c5b6a229f6e697e45d888450da7072489347eea11c78f3c63d5412c71bec8cdbbbb4f012874006473c959a98f622e8437bbf27b7dcd62f9974ccba053b80226df4c21860174dbc22d785932bacb0853764e7a417ba2f635d48b31869487ead5736a8fd0f74c29599858c9c168d473515d5a5507879916ae2ef258133898a4d2632ca1f056e261844dcf68f842485f560d38ba49cea70b7b769d999f2810f66ed2a8330c0d5ecc845eaf2892f2814b7edbdb2f11071487ea2fdb140920128a0eaf403d1c865820664247e94c5545251d084f29b99ebea8e4b0e13e8eaf24e8581844e78432c701a81756a9708949099a455744de281736a7b3b912836bfcdb3a42d2be821a707e98a34351d0875cf0008cd7d45e6889ad39b4794f565b60950165c1b173564f1b49e16726dfc5762e424abaa988e1347157243662a961b5dea4e3600c510fa4f517b667a67be0cd5a43fafa1617e6ae15a72bce7dd9f90115348e4813188f51e77a9d4d61cef041d89728d746a59d391f6069b5ffe1e41729ce633f7e659cff645b76e0692ad346feee0508f76a4c35e5a2da7277d7edb8e5c544"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000001fde), 0x4) 14:16:11 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:11 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="880000000000000000000000000000004b916a4ab582f1cde43db451c3b73a6e0015ca541800ddc1c87374016070b28f91ed00121a33089b1202ac4469586b5cd7316b0eb7eb4f65c697b62fa22233bb0dc3761c0ec74af621007478380c76fd4819158aa4c8953091c5ee57b6af4d4f23d68a6be5bb5fc153dd91275690c1c210166ef76553251fa6e6ed30320000000000000088000000000000000000000000000000a11c9941c827594636d0ed22245a5a10c105fa9e5fa854034788ffa67a4d0ef0087194bde2c16a8da015cecef8cbedc7a040d56fd2c70294fac6e04fcb06fdf7766d17e065588cf0f6fef64c8b3bdd4e238567d04955c3ed781fdb180d5c918a2bb356872fe273942f735e737e76bc6cff00000000000000b8000000000000000000000000000000ec7200af80deb7070d132f509140ad451a315ab23dbaa1eceba20684372f886756934385d802583b0cdfab1045111a2ebaa782cd3382141abaed99740ec265bd542e7ad79947b882ff9bfed684bd82a5526b9a6a16f009a5e54327c0ea1156e26966fba43740aee2db64c6368748e13f558e81154b69c55db4c4a33c189e0cfa09d2477a92e69cb9c942e9f89594b82359d61be92447f9e1f5468cf2a3c175dc0c00000000000000380700000000000000000000000000009fcac400e3038227d48fe53a9ecdcd5ea87c6bf10242f192e3ef4193802661d9a05906a67fc45ca98325ac1f56469e5ccaefdf9757467dc9e07b318defa2f43793a0f46a339905e2883fbd9df49f964b761f58660148b78e25d04f5f3d430f884c7393a1bc7437f2ea06b5b944ba35f5cf11acafea1e44b0ff07e63db48b7875a999246e2ee5e24ec030a345c7ff01c3a7e2b73cc8fe41dc9cea2f2bf286532b2e98bd08786bbc45b146a12c4008cab72bd461a68c97b32764753bd40d1cd866106f8b59afbf9c2d39ab89a852f1e4206f165d84f86650d7a6e95d07646566a978e6a09e87082fa680afc436db5714e4de604155c02beb678d661b523bca634536466aa812084530ec0bd708695afc9977618cd41752fbe87bfaae8b208bfd009c7bcf50067ea2b00b4fe473de5e7467e511fa2340c08d8303c95c7d0d786af9b6dbb1e591f5a5251ee4c3ba8d961d424684a966fef07bc64c15dfd26bc29861393ebf983b711a7e91baca153f8c0f168544e900b89dda8f7edbfcb4af904571d21d343116ba679a73ec800519cd99d40733c4d7c4b514c5c1555f17a43a7e787f13e2267c1b01ca02c00bd618658702ac0c4fc5158c9b0cd7f1f3e74772627cf4e5764d912e9e375f93fda32ba05f5e3e13c7c7668e6aac724ac6b863f974b253f12a783fe5ffc4e5684e1b5b93e03e42c09f239e2307052b3e316a8846f17fface69e73a0452ac529ebcfdbca1c6087d77f54c8477ce7bb834ed175ef8dc12e4e126ea89dbf538011906a895f3d378928318891ae6679b459f0708ccb57a5e8c2c0adb18864d7f26c43e388a9cff63143b172ebedd26513bd3708d8fd07ebd0c0a858d6a81185055324f7da0382140dea52fc1db2d04fe6dd24e4b3ca065af6f8cea69c515465db52bfa52fa4eec1061b2b58b7893844815a47a70a80e042d75fc9df871c9979c047ef254b73a86f597d77ae36e34a9279a521f491a27edd3753fad0c394d7e85128daa37a17c67328ea194606cd5de9d3f46d1b12ea31608f76381f6ac49dd2bdd15908db765bc1b940a2ef37780c19caf159441a1afbe0ed600c8178f5b68b84ccd6a727353fe1c545b75f67eee2cb7218e73ca1a9507d67709d0a40c20a4072741dd3f0943184c2941651e51d9b39c215e206b0dfb9d4c5e33229f914a8ce74a0ad5e25fe09958bece82cb0703eedbe642177902ede236aa7fe42a37030e125c13dcd9e88c69f51e99df9ddf6569934a04be70099d39bebbaef5353f7ddd0f4d52452da9b1074bc069af2b295298492611a907cb6547a2eb129747811db9a22cd95f0807c6504ab11e629ce8ed90e40800515e164f9cbf335670b55489b33ae265675fd6293d73185f4066a914ddfd610f415ac8e6ee3a50c2d2ab1bd470528ac04ceb7ec8771d3cbc3a45abc10e9e813d2c35c836de3c2e7631ab0e784ac45cbbebaca629b26b1a26c6dea42a6740aa3fb5b1e4d5d0f202caa906241d258b4b1e319e6a79f446e93fd0363377cd1652edf941387df56c3e53b9a404519d980470797cfeee39e00cfd57c0c29903b8267b755e29515f932728b5bdcf5aaf407aa240d41ac9f65fada0cb68a1057fc647492b3bd1c49e4dd644846879d59d6aac50ad5364dc15cc42d3370f1ca71823ae545b11e2240f9477cb45c7b277d2bf0e654933a4cac95cde02415624a76ff5769c66eed885835c5537abcc1d013de5160261f19738907a6462184be35887200c30b0a4ff3cd8adff03c8057bef7193295b613ca8b4f74fec054e4a3f9f1c85f70531f4f983f5ec19dab4ac0f435d121d7491e46f4e2b7514a85a9fdfb89fe5167c0506d393fc28aac832002c23b07acd5577562e4c085e93972b15dc03bb64d11cd060418182eca96b357c7f11a2ab2be37bb1a6f5988a776c473025c5ed4dae98b11b2cbdfc10e0d514e71b2b519b8590eee8b1276db3ef9c1e34abfc11d1ceed6c5b6a229f6e697e45d888450da7072489347eea11c78f3c63d5412c71bec8cdbbbb4f012874006473c959a98f622e8437bbf27b7dcd62f9974ccba053b80226df4c21860174dbc22d785932bacb0853764e7a417ba2f635d48b31869487ead5736a8fd0f74c29599858c9c168d473515d5a5507879916ae2ef258133898a4d2632ca1f056e261844dcf68f842485f560d38ba49cea70b7b769d999f2810f66ed2a8330c0d5ecc845eaf2892f2814b7edbdb2f11071487ea2fdb140920128a0eaf403d1c865820664247e94c5545251d084f29b99ebea8e4b0e13e8eaf24e8581844e78432c701a81756a9708949099a455744de281736a7b3b912836bfcdb3a42d2be821a707e98a34351d0875cf0008cd7d45e6889ad39b4794f565b60950165c1b173564f1b49e16726dfc5762e424abaa988e1347157243662a961b5dea4e3600c510fa4f517b667a67be0cd5a43fafa1617e6ae15a72bce7dd9f90115348e4813188f51e77a9d4d61cef041d89728d746a59d391f6069b5ffe1e41729ce633f7e659cff645b76e0692ad346feee0508f76a4c35e5a2da7277d7edb8e5c544"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, 0x0, 0x0) 14:16:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:11 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:11 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, 0x0, 0x0) 14:16:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:11 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:11 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="880000000000000000000000000000004b916a4ab582f1cde43db451c3b73a6e0015ca541800ddc1c87374016070b28f91ed00121a33089b1202ac4469586b5cd7316b0eb7eb4f65c697b62fa22233bb0dc3761c0ec74af621007478380c76fd4819158aa4c8953091c5ee57b6af4d4f23d68a6be5bb5fc153dd91275690c1c210166ef76553251fa6e6ed30320000000000000088000000000000000000000000000000a11c9941c827594636d0ed22245a5a10c105fa9e5fa854034788ffa67a4d0ef0087194bde2c16a8da015cecef8cbedc7a040d56fd2c70294fac6e04fcb06fdf7766d17e065588cf0f6fef64c8b3bdd4e238567d04955c3ed781fdb180d5c918a2bb356872fe273942f735e737e76bc6cff00000000000000b8000000000000000000000000000000ec7200af80deb7070d132f509140ad451a315ab23dbaa1eceba20684372f886756934385d802583b0cdfab1045111a2ebaa782cd3382141abaed99740ec265bd542e7ad79947b882ff9bfed684bd82a5526b9a6a16f009a5e54327c0ea1156e26966fba43740aee2db64c6368748e13f558e81154b69c55db4c4a33c189e0cfa09d2477a92e69cb9c942e9f89594b82359d61be92447f9e1f5468cf2a3c175dc0c00000000000000380700000000000000000000000000009fcac400e3038227d48fe53a9ecdcd5ea87c6bf10242f192e3ef4193802661d9a05906a67fc45ca98325ac1f56469e5ccaefdf9757467dc9e07b318defa2f43793a0f46a339905e2883fbd9df49f964b761f58660148b78e25d04f5f3d430f884c7393a1bc7437f2ea06b5b944ba35f5cf11acafea1e44b0ff07e63db48b7875a999246e2ee5e24ec030a345c7ff01c3a7e2b73cc8fe41dc9cea2f2bf286532b2e98bd08786bbc45b146a12c4008cab72bd461a68c97b32764753bd40d1cd866106f8b59afbf9c2d39ab89a852f1e4206f165d84f86650d7a6e95d07646566a978e6a09e87082fa680afc436db5714e4de604155c02beb678d661b523bca634536466aa812084530ec0bd708695afc9977618cd41752fbe87bfaae8b208bfd009c7bcf50067ea2b00b4fe473de5e7467e511fa2340c08d8303c95c7d0d786af9b6dbb1e591f5a5251ee4c3ba8d961d424684a966fef07bc64c15dfd26bc29861393ebf983b711a7e91baca153f8c0f168544e900b89dda8f7edbfcb4af904571d21d343116ba679a73ec800519cd99d40733c4d7c4b514c5c1555f17a43a7e787f13e2267c1b01ca02c00bd618658702ac0c4fc5158c9b0cd7f1f3e74772627cf4e5764d912e9e375f93fda32ba05f5e3e13c7c7668e6aac724ac6b863f974b253f12a783fe5ffc4e5684e1b5b93e03e42c09f239e2307052b3e316a8846f17fface69e73a0452ac529ebcfdbca1c6087d77f54c8477ce7bb834ed175ef8dc12e4e126ea89dbf538011906a895f3d378928318891ae6679b459f0708ccb57a5e8c2c0adb18864d7f26c43e388a9cff63143b172ebedd26513bd3708d8fd07ebd0c0a858d6a81185055324f7da0382140dea52fc1db2d04fe6dd24e4b3ca065af6f8cea69c515465db52bfa52fa4eec1061b2b58b7893844815a47a70a80e042d75fc9df871c9979c047ef254b73a86f597d77ae36e34a9279a521f491a27edd3753fad0c394d7e85128daa37a17c67328ea194606cd5de9d3f46d1b12ea31608f76381f6ac49dd2bdd15908db765bc1b940a2ef37780c19caf159441a1afbe0ed600c8178f5b68b84ccd6a727353fe1c545b75f67eee2cb7218e73ca1a9507d67709d0a40c20a4072741dd3f0943184c2941651e51d9b39c215e206b0dfb9d4c5e33229f914a8ce74a0ad5e25fe09958bece82cb0703eedbe642177902ede236aa7fe42a37030e125c13dcd9e88c69f51e99df9ddf6569934a04be70099d39bebbaef5353f7ddd0f4d52452da9b1074bc069af2b295298492611a907cb6547a2eb129747811db9a22cd95f0807c6504ab11e629ce8ed90e40800515e164f9cbf335670b55489b33ae265675fd6293d73185f4066a914ddfd610f415ac8e6ee3a50c2d2ab1bd470528ac04ceb7ec8771d3cbc3a45abc10e9e813d2c35c836de3c2e7631ab0e784ac45cbbebaca629b26b1a26c6dea42a6740aa3fb5b1e4d5d0f202caa906241d258b4b1e319e6a79f446e93fd0363377cd1652edf941387df56c3e53b9a404519d980470797cfeee39e00cfd57c0c29903b8267b755e29515f932728b5bdcf5aaf407aa240d41ac9f65fada0cb68a1057fc647492b3bd1c49e4dd644846879d59d6aac50ad5364dc15cc42d3370f1ca71823ae545b11e2240f9477cb45c7b277d2bf0e654933a4cac95cde02415624a76ff5769c66eed885835c5537abcc1d013de5160261f19738907a6462184be35887200c30b0a4ff3cd8adff03c8057bef7193295b613ca8b4f74fec054e4a3f9f1c85f70531f4f983f5ec19dab4ac0f435d121d7491e46f4e2b7514a85a9fdfb89fe5167c0506d393fc28aac832002c23b07acd5577562e4c085e93972b15dc03bb64d11cd060418182eca96b357c7f11a2ab2be37bb1a6f5988a776c473025c5ed4dae98b11b2cbdfc10e0d514e71b2b519b8590eee8b1276db3ef9c1e34abfc11d1ceed6c5b6a229f6e697e45d888450da7072489347eea11c78f3c63d5412c71bec8cdbbbb4f012874006473c959a98f622e8437bbf27b7dcd62f9974ccba053b80226df4c21860174dbc22d785932bacb0853764e7a417ba2f635d48b31869487ead5736a8fd0f74c29599858c9c168d473515d5a5507879916ae2ef258133898a4d2632ca1f056e261844dcf68f842485f560d38ba49cea70b7b769d999f2810f66ed2a8330c0d5ecc845eaf2892f2814b7edbdb2f11071487ea2fdb140920128a0eaf403d1c865820664247e94c5545251d084f29b99ebea8e4b0e13e8eaf24e8581844e78432c701a81756a9708949099a455744de281736a7b3b912836bfcdb3a42d2be821a707e98a34351d0875cf0008cd7d45e6889ad39b4794f565b60950165c1b173564f1b49e16726dfc5762e424abaa988e1347157243662a961b5dea4e3600c510fa4f517b667a67be0cd5a43fafa1617e6ae15a72bce7dd9f90115348e4813188f51e77a9d4d61cef041d89728d746a59d391f6069b5ffe1e41729ce633f7e659cff645b76e0692ad346feee0508f76a4c35e5a2da7277d7edb8e5c544"], 0x8ff}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x7}, 0xfffffffffffffd96) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, 0x0, 0x0) 14:16:11 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:11 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:11 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:11 executing program 4: open(0x0, 0x80040, 0x0) mkdir(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = gettid() getresuid(&(0x7f0000000500), 0x0, &(0x7f0000000580)) r3 = getegid() r4 = getegid() stat(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mknod(&(0x7f0000000940)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8, 0x5) setxattr$system_posix_acl(&(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f00000008c0)={{}, {0x1, 0x4}, [{0x2, 0x3}], {0x4, 0x1}, [{0x8, 0x3, r3}, {0x8, 0x1, r4}, {0x8, 0x2, r5}, {0x8, 0x6, r6}, {0x8, 0x4, r7}], {0x10, 0x1}}, 0x54, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) capget(&(0x7f0000000000)={0x20071026, r2}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000002c0)={0x9d, 0xe9}, 0x20) renameat2(0xffffffffffffffff, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) 14:16:11 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:12 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:12 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:12 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f00000001c0)=0x83, 0xc0e3e72b231a9b7b) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) 14:16:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:12 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:12 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:12 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r0, 0x29, 0xce, 0x0, 0xffffffffffffffff) 14:16:12 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:12 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) [ 809.013757][ C0] net_ratelimit: 30 callbacks suppressed [ 809.013769][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:12 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:12 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r0, 0x29, 0xce, 0x0, 0xffffffffffffffff) [ 809.192239][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:12 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:12 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700), 0x100000000000000d) [ 809.348032][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 809.354281][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 809.365993][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:12 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:12 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:12 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 809.667667][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 809.668128][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 809.673500][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 809.679508][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 809.691684][ C1] protocol 88fb is buggy, dev hsr_slave_0 14:16:13 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:13 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:13 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:13 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:15 executing program 4: 14:16:15 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:15 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:15 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:15 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:16 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:16 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:16 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0), 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:16 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) [ 814.307689][ C1] net_ratelimit: 24 callbacks suppressed [ 814.307698][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 814.320144][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 814.387667][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 814.393577][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 815.587695][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 815.593528][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 815.907660][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 815.907689][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 815.913456][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 815.924952][ C1] protocol 88fb is buggy, dev hsr_slave_0 14:16:22 executing program 4: 14:16:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0), 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:22 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:22 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:22 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:22 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0), 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:22 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:22 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:22 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:22 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) [ 819.747693][ C1] net_ratelimit: 17 callbacks suppressed [ 819.747702][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 819.759207][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 820.067675][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 820.073524][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 820.077625][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 820.079335][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 820.084992][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 820.090705][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 820.547674][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 820.553502][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:16:26 executing program 4: 14:16:26 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:26 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:26 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:26 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:26 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x0, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:26 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:26 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:26 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) [ 824.787649][ C1] net_ratelimit: 23 callbacks suppressed [ 824.787657][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 824.799102][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 825.987668][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 825.993526][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 826.307668][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 826.313500][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 826.317628][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 826.319305][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 826.324949][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 826.330655][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:16:30 executing program 4: 14:16:30 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:30 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x0, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:30 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:30 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:30 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:30 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x0, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:31 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:31 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) [ 830.147667][ C1] net_ratelimit: 16 callbacks suppressed [ 830.147676][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 830.159978][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 830.467647][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 830.467677][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 830.473530][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 830.479296][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 830.490697][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 830.947676][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 830.953496][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 831.027654][ C1] protocol 88fb is buggy, dev hsr_slave_0 14:16:34 executing program 4: 14:16:34 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:34 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:34 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:34 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:34 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:34 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:35 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:35 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:36 executing program 4: 14:16:36 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:36 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:36 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:36 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:37 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:37 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:37 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 835.187652][ C1] net_ratelimit: 23 callbacks suppressed [ 835.187662][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 835.199134][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 836.387680][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 836.393503][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 836.707657][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 836.707683][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 836.713466][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 836.719230][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 836.730631][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 837.187695][ C1] protocol 88fb is buggy, dev hsr_slave_0 14:16:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/79, 0x4f}, {0x0}, {0x0, 0x36c}], 0x1000000000000009, 0x0, 0x69}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x2ea3, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) getsockopt$inet_mreq(r2, 0x0, 0x9, 0x0, &(0x7f0000000040)) recvfrom$inet(r2, 0x0, 0x1789836bed901fc7, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) 14:16:43 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:43 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:43 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:43 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:43 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:43 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:43 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:43 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) [ 840.547647][ C1] net_ratelimit: 16 callbacks suppressed [ 840.547653][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 840.559122][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 840.867654][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 840.867680][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 840.873445][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 840.879199][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 840.890604][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 841.347671][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 841.353494][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 841.427667][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 845.587656][ C1] net_ratelimit: 22 callbacks suppressed [ 845.587662][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 845.599151][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 846.787672][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 846.793494][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:16:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x0, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0x68, &(0x7f00000001c0)={{0x1c, 0x1c, 0x2}, {0x1c, 0x1c, 0x2}, 0x81, [0x16, 0x95b9, 0x7, 0x3, 0x3, 0x0, 0x9a0, 0x6]}, 0x5c) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e0075f) 14:16:50 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:50 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:50 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:50 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) [ 847.107649][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 847.107654][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 847.107701][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 847.113452][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 847.119216][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 847.136286][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:16:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:50 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:50 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:50 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:50 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) [ 850.947673][ C1] net_ratelimit: 19 callbacks suppressed [ 850.947683][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 850.959188][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 851.267648][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 851.267683][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 851.273444][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 851.284930][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 851.290689][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 851.747700][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 851.753618][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 851.827651][ C1] protocol 88fb is buggy, dev hsr_slave_0 14:16:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/79, 0x4f}, {0x0}, {0x0, 0x36c}], 0x1000000000000009, 0x0, 0x69}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x2ea3, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) fcntl$dupfd(r1, 0x0, r2) recvfrom$inet(r2, 0x0, 0x1789836bed901fc7, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) 14:16:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:56 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:56 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:56 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:56 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:57 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:16:57 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:57 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:16:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:16:57 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) [ 855.987664][ C1] net_ratelimit: 26 callbacks suppressed [ 855.987674][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 855.999904][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 857.187675][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 857.193491][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 857.507647][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 857.507675][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 857.513433][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 857.519200][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 857.530584][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 857.987709][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 861.347668][ C1] net_ratelimit: 15 callbacks suppressed [ 861.347676][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 861.359143][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 861.667704][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 861.673548][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 861.677644][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 861.679349][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 861.685004][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 861.690707][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 862.147672][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 862.153514][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:17:06 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:17:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000700)=[{&(0x7f00000002c0)=""/4, 0x4}], 0x1) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x7813, 0x2, 0x0, 0x800e00515) shutdown(r1, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xcebf, 0x6, 0x0, 0x800e00519) shutdown(r2, 0x0) 14:17:06 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:17:06 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:06 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) 14:17:06 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x0, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:06 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(0x0, &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:06 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) 14:17:06 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:17:06 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(0x0, &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) [ 866.387646][ C1] net_ratelimit: 25 callbacks suppressed [ 866.387654][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 866.399114][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 867.587674][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 867.593499][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 867.907653][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 867.907689][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 867.913449][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 867.919209][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 867.930741][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 868.387682][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 871.747659][ C1] net_ratelimit: 14 callbacks suppressed [ 871.747668][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 871.759155][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 872.067685][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 872.073529][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 872.077636][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 872.079329][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 872.084984][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 872.090671][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:17:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) r1 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x51, &(0x7f00000000c0)={0x0, {{0x1c, 0x1c}}}, 0x88) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e0075f) 14:17:15 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x0, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) 14:17:15 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:15 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(0x0, &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:15 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) [ 872.511493][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 872.548274][ C1] protocol 88fb is buggy, dev hsr_slave_0 14:17:15 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:17:15 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:15 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x0, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:15 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:17:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 876.787662][ C1] net_ratelimit: 27 callbacks suppressed [ 876.787671][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 876.799139][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 877.987676][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 877.993528][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 878.307674][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 878.313492][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 878.317624][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 878.319285][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 878.324937][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 878.330642][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:17:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000002440)={0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000000080)=""/191, 0xbf}, {0x0}], 0x2}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x192fb1, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r4, &(0x7f0000000600)=[{&(0x7f0000000540)=""/141, 0x8d}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r5 = dup(r4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r5, 0x0) recvmsg(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000002c0)=""/186, 0xba}, {0x0}], 0x2}, 0x0) shutdown(r6, 0x0) shutdown(r3, 0x0) 14:17:25 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:25 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:17:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 14:17:25 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:25 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x0, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) [ 881.855105][ C0] net_ratelimit: 16 callbacks suppressed [ 881.855116][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:17:25 executing program 1: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000400)='encrypted\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000480)='b', 0x1, 0xfffffffffffffffb) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000600)="14", 0x1, 0xfffffffffffffffb) 14:17:25 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:25 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:25 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x0, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) [ 882.057839][T24225] encrypted_key: insufficient parameters specified [ 882.116066][T24225] encrypted_key: insufficient parameters specified [ 882.148243][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 882.154593][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:17:25 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:17:25 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x0, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) [ 882.467644][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 882.468005][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 882.473441][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 882.479387][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 882.484920][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 882.496331][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 882.947668][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 887.107665][ C1] net_ratelimit: 21 callbacks suppressed [ 887.107675][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 887.119181][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 887.187667][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 887.193565][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 888.387646][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 888.393444][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 888.707649][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 888.707666][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 888.713634][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 888.719372][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:17:34 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 14:17:34 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = getpgrp(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x12, &(0x7f00003efff0)) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) read(r2, &(0x7f0000000240)=""/128, 0x80) 14:17:34 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:34 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:34 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:17:34 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:34 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0x30}], 0x10000000000000b3) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0xfffffe82) 14:17:34 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:34 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:34 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x0, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:34 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:17:34 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) [ 892.547659][ C1] net_ratelimit: 17 callbacks suppressed [ 892.547668][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 892.559203][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 892.867650][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 892.867682][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 892.873447][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 892.879209][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 892.890608][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 893.347670][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 893.353487][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 893.427644][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 897.587649][ C1] net_ratelimit: 22 callbacks suppressed [ 897.587658][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 897.599174][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 898.787670][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 898.793481][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 899.107656][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 899.107682][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 899.113471][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 899.119218][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 899.130623][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 899.587689][ C1] protocol 88fb is buggy, dev hsr_slave_0 14:17:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 14:17:43 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:17:43 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x0, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfd37bf070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x88d) accept(r1, &(0x7f0000000080)=@generic, 0x0) 14:17:43 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:43 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x0, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:43 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0xfffffffffffffe00, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x0, 0x800, 0x6, 0x7, 0x0, 0x6, 0x100, 0x0, 0x0, 0x0, 0x1, 0x5, 0x27, 0x80000000, 0x0, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:44 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x0, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) 14:17:44 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x8, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) syz_open_pts(r0, 0x0) 14:17:44 executing program 1: 14:17:44 executing program 1: 14:17:44 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) chmod(0x0, 0x800000003) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800a0, 0xb, 0x0, 0x10001, 0x5, 0x0, 0x4, 0x0, 0x2, 0x5, 0x0, 0x7ff, 0x4, 0x0, 0x5, 0x800, 0x6, 0x7, 0x3, 0x6, 0x100, 0x0, 0x0, 0x7, 0x1, 0x5, 0x27, 0x80000000, 0x3, 0x4, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x4020, 0x4, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x5bb8, 0xffffffffffffffff, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x2, 0x0, 0x1020000000000000, 0x1f, 0x0, 0x9, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8], [0x0, 0x0, 0x6, 0x6f, 0x51d, 0x1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffc00], [0x0, 0x9, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x0, 0x601, 0x101, 0x0, 0x100000001, 0x9d9, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x401, 0x0, 0x3, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x367, 0x401, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x7, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0xce9, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x2a, 0x0, 0x1, 0x10001, 0x0, 0x7], [0x0, 0x7, 0x0, 0xbb, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x601d0c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x3, 0x0, 0x6, 0x8, 0x9, 0x1, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x88c8, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xe41f, 0x0, 0x1]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/51) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) syz_open_pts(r0, 0x0) [ 902.947667][ C1] net_ratelimit: 16 callbacks suppressed [ 902.947676][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 902.959140][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 903.267648][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 903.267681][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 903.273436][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 903.284924][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 903.290697][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 903.747667][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 903.753522][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 903.827687][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 907.987658][ C1] net_ratelimit: 23 callbacks suppressed [ 907.987664][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 907.999110][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 908.871786][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 909.187647][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 909.193531][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 909.507638][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 909.513539][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 909.519318][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 909.525042][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 909.987664][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 913.347640][ C1] net_ratelimit: 13 callbacks suppressed [ 913.347647][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 913.359073][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 913.667663][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 913.673465][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 913.679234][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 913.684967][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 914.147648][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 914.153450][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 914.227630][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 914.233406][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 918.387615][ C1] net_ratelimit: 18 callbacks suppressed [ 918.387623][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 918.399028][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 919.587659][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 919.593473][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 919.907645][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 919.913432][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 919.919189][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 919.924910][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 920.387646][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 920.393435][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 923.747647][ C1] net_ratelimit: 12 callbacks suppressed [ 923.747655][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 923.759085][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 924.067651][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 924.073448][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 924.079210][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 924.084937][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 924.547644][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 924.553423][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 924.627651][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 924.633422][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 928.787631][ C1] net_ratelimit: 18 callbacks suppressed [ 928.787639][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 928.799061][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 929.987644][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 929.993452][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 930.307636][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 930.313437][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 930.319213][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 930.324963][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 930.787642][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 930.793435][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 934.147669][ C1] net_ratelimit: 12 callbacks suppressed [ 934.147679][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 934.159095][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 934.467641][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 934.473531][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 934.479320][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 934.485052][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 934.947648][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 934.953472][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 935.027634][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 935.033411][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 939.187617][ C1] net_ratelimit: 18 callbacks suppressed [ 939.187624][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 939.199037][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 940.387648][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 940.393457][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 940.707640][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 940.713429][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 940.719190][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 940.725003][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 941.187646][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 941.193438][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 944.547657][ C1] net_ratelimit: 12 callbacks suppressed [ 944.547665][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 944.559071][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 944.867640][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 944.873422][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 944.879189][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 944.884914][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 945.347655][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 945.353445][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 945.427625][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 945.433390][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 949.587620][ C1] net_ratelimit: 18 callbacks suppressed [ 949.587627][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 949.599046][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 950.787643][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 950.793434][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 951.107636][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 951.113426][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 951.119185][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 951.124901][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 951.587638][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 951.593414][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 954.947639][ C1] net_ratelimit: 12 callbacks suppressed [ 954.947646][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 954.959052][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 955.267635][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 955.273427][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 955.279202][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 955.284927][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 955.747641][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 955.753457][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 955.827627][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 955.833405][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 959.987625][ C1] net_ratelimit: 18 callbacks suppressed [ 959.987633][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 959.999055][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 961.187648][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 961.193445][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 961.507639][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 961.513418][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 961.519195][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 961.524925][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 961.987645][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 961.993449][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 965.347644][ C1] net_ratelimit: 12 callbacks suppressed [ 965.347652][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 965.359063][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 965.667654][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 965.673438][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 965.679200][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 965.684926][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 966.147650][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 966.153441][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 966.227625][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 966.233483][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 970.387630][ C1] net_ratelimit: 18 callbacks suppressed [ 970.387637][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 970.399053][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 971.587645][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 971.593435][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 971.907637][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 971.913457][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 971.919239][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 971.924968][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 972.387636][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 972.393433][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 975.747636][ C1] net_ratelimit: 12 callbacks suppressed [ 975.747644][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 975.759554][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 976.067640][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 976.073417][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 976.079197][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 976.084910][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 976.547635][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 976.553413][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 976.627640][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 976.633507][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 980.787627][ C1] net_ratelimit: 18 callbacks suppressed [ 980.787635][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 980.799081][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 981.987666][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 981.993480][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 982.307634][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 982.313417][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 982.319197][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 982.324923][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 982.787660][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 982.793623][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 986.147656][ C1] net_ratelimit: 12 callbacks suppressed [ 986.147663][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 986.159074][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 986.467639][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 986.473416][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 986.479181][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 986.484932][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 986.947651][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 986.953460][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 987.027630][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 987.033406][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 991.187623][ C1] net_ratelimit: 18 callbacks suppressed [ 991.187630][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 991.199034][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 992.387649][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 992.393438][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 992.707636][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 992.713431][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 992.719211][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 992.724934][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 993.187648][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 993.193445][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 996.547650][ C1] net_ratelimit: 12 callbacks suppressed [ 996.547657][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 996.559100][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 996.867641][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 996.873443][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 996.879220][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 996.884961][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 997.347637][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 997.353429][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 997.427623][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 997.433405][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1001.587621][ C1] net_ratelimit: 18 callbacks suppressed [ 1001.587628][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1001.599041][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1002.787651][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1002.793467][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1003.107651][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1003.113443][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1003.119209][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1003.124941][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1003.587653][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1003.593461][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1006.947656][ C1] net_ratelimit: 12 callbacks suppressed [ 1006.947663][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1006.959081][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1007.267652][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1007.273442][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1007.279212][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1007.284949][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1007.747644][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1007.753435][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1007.827631][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1007.833401][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1011.987640][ C1] net_ratelimit: 18 callbacks suppressed [ 1011.987648][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1011.999085][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1013.187646][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1013.193441][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1013.507641][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1013.513445][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1013.519221][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1013.524949][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1013.987642][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1013.993438][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1017.347632][ C1] net_ratelimit: 12 callbacks suppressed [ 1017.347640][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1017.359062][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1017.667652][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1017.673436][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1017.679209][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1017.684925][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1018.147640][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1018.153531][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1018.227617][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1018.233382][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1022.387616][ C1] net_ratelimit: 18 callbacks suppressed [ 1022.387624][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1022.399055][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1023.517575][ C1] ------------[ cut here ]------------