181, r1, r3, 0x8, 0x81, 0x4, 0x8000, 0x4, 0x5, 0x8000, 0x100000001, 0x6, 0x7, 0x1ff, 0x5, 0x6, 0x1f, 0x2800000000000}}, 0xa0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x4f, 0x6, 0x100000000, "3ec582540bfd7afa62ae87ea2f1c9f14", "a4a296a8b64716a8820dcf49a8d8ab92b4e7104d70f8d7c3fd7b34baa03c652974863be4a66dcc4ee28981ac2e0314feeff90f8ccc2f30881fd8"}, 0x4f, 0x1) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, r4, 0x2, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x2}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0xc0) fcntl$setsig(r0, 0xa, 0x3b) r5 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x228002) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f00000004c0)="03a6cb02d5c578fdd9233ca723a3be0d85d292ee2f58460fec9a810bf257c192a90b97d0d7ecb0cf8273680b961865c63326adfbca4161178fd31aa8c628d88ab9d7df5ea072116b", 0x48) r6 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) setxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.apparmor\x00', &(0x7f0000000600)='TIPC\x00', 0x5, 0x1) r7 = getpid() fcntl$setown(r6, 0x8, r7) write$P9_RSETATTR(r0, &(0x7f0000000640)={0x7, 0x1b, 0x2}, 0x7) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000680)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r6, 0x40106614, &(0x7f00000006c0)) ptrace$getsig(0x4202, r7, 0x7fffffff, &(0x7f0000000700)) write$FUSE_ATTR(r0, &(0x7f0000000780)={0x78, 0x0, 0x1, {0x6, 0x2, 0x0, {0x5, 0x8001, 0x9, 0x4, 0x0, 0x5, 0xff, 0x5, 0x4, 0x3, 0x40, r1, r2, 0x9, 0x5e}}}, 0x78) write$UHID_CREATE2(r0, &(0x7f0000000800)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xbf, 0xfffffffffffff7c3, 0x100000000, 0x4, 0x5, 0x5, "3b8894ac593ef9e19e0471d36c25aa43fda85d6f8efb3537c32d3b7af7ddac9da80c0519e3221384dbe98da9f5b3c572e98d684d20605d38bfdc87f75f0f90fe1649b3f4c121f9ad31e13c2c081b89645761d5f662f47da7c62be979da0eac9ee854676e932fd148b0532747f20a8e8d59b7b0943fc1badce18c159168ad0d5963e40e62c4ec6079a76d57c990ede98980b09d464be42a41d2e112e8389b3ccedcc9db40da528db8c4ef2859af6df01af634f94f593768155b7569793650d0"}, 0x1d7) ioctl$TCSETS2(r5, 0x402c542b, &(0x7f0000000a00)={0x8, 0x81, 0xf4, 0x7, 0x8, "b3acfe6bf3960a6fb0316ee4a4aab19c61852a", 0x75e5, 0x8}) r8 = socket$nl_generic(0x10, 0x3, 0x10) mlockall(0x1) r9 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000a40)='/selinux/member\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r5) pwritev(r9, &(0x7f0000002d40)=[{&(0x7f0000000a80)="f2c9b2a587ede780a60fbbe7ec20e558a9af37f0315367a3afcfeac968de75ea26062cc14c2aa38dab14d8b04e48cea598cdb8329b93f02a56190b8135e9a38c4216e8b5cbbcce364ebc92ace69d0937e2be728f22aff2b5ae622c8a2df8b91e69cfa7c970ec0cdca7492f972bd5384d106ee6aedc2fe90d99aba668f1214b22666e8b5a2a97f539b0da6d7e00f2dfe1062224cb8432151a190b5bfa142ec1bae3443e5117165d927c1f6342eab26e744964e8e18f06badfacfefbb354ac42cc01d96a7e62ccbe36e1ca1fd3f621148304c000c6ed085c969935a8fc728e1fbec11d3f", 0xe3}, {&(0x7f0000000b80)="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", 0x1000}, {&(0x7f0000001b80)="69e3103c51eb885c6ded2a00f823dc4a6086bbe9861b90c6dc25bc83d7c1ae3767be571b644be156c690d9de30ffcb79fc97cc69fd6fbd133fd2ac76d75f1ad744676638a02f7d3c1b8432b49a4d2418458ad976e26328fcdc0904c894abf5eb19e9881b0a5c5ad7f654b3aa391fde2cb1b7db3183fd01b8bff7215978dfd8268e929807b6c59d2602e1e9e587c597a3c640b451825bcca75a21655feaa8bb3210165dd6d7330efddf0a679bdb6857e6445c10", 0xb3}, {&(0x7f0000001c40)="91506e2ad2e37db11081cf67809bd68bb4b3d32c2ea96d2582efa29ce0295e20535c15eb93a40510f28b348bd34cfaebc8132b580fb0addfcc50401471b319eb2fc14ae6723c480f4d070ada2bdeb575039ab49fde05e9b403b278b9273c9f5bd6d89116c07e0aa9f5a57375c2eefa49dc4662175c3b8a4fb93c8d006f5818bfee902179acfe25a35146c1b795cf7bdf13d79f5474dd8e8e66d10b53e43ab10511ca697a8f", 0xa5}, {&(0x7f0000001d00)="286d3ff42901d349f66a64dcf706456126078834d57def1d0d45cb591ee6b334991cc829eb415c671c237f495429d65ddc8fafcbd72c63e3b713cbda5afdef682bb9adf6edf1c8f09a95e29774ba3353e8cb11072398b7645cd95c5aedd044592097c1177ab965482ff114fe06344047af58e618d588f91d10f507425605937afff6ee850f1b63d103f5b37b20f129e74d3ff3ea1e18676f0d1c810f5671da746bd8e62b41230b4aec32edc8d61da24047e5a7c11613098be3a0e4f9b54bbac03d4fc74dd5ea66ac4e8d81a3c7b68cf119fd88c33b8db4bb0bf2aac188b914fa7423981dbff76efda2e24000fb4e8b472601d831dcf015ec563c0578d4f41eb142cfb51c8f35263a627fb8947b87c9980089f3fbdeaf1d6410d28f2060cfc8f3988ec5e04f39c9d073d4d5a4374ee67ead95b49593e8b01a7b5cf52cc02c88f03421f71503785ce01fd298fe8ef54b13807144866dcf54f0ec779fe6600966293e01b59a222df4123b522d0f0426ef2385d24f9c48fdb66600efe936577e14196d3deb7e1f8c4d974412d6f028ddcb2a1ec537a2d6927730795e1618da0b9ae51a5e5551c1f64c766cec26e8ab32da315bb035f7db1fc89d9a5a5dc0ab53ceb3c2174d285cec9fbd3fb7cd12a323703db0dfeca776340bba0863781448ccc67f7d4d895b1036787dcf364aba723599e04bb43809d0d9e39ebeedc8b23c445dd84f31dc040f916519860adbe37dbda92264ba89dc582e91fc13f39578128531be3d74feb6e9d8f9f9aa72eaec5ceb1e8130258f353968f9b760954d82a25df137c56e4c49640ec8c4f21ab069094fbaefc24074dc4fb47e6dab894d27a34aab7481c0666e8741194a5b515496eda56a8c30c7358a18114b025706ac4cf5b85a88404efc3adda565d28a80383d602ddcf1a91c08c3ab826f04ab0fec31ee1746f7e4cbbc24939f8212c55bf68bd20e5e82b02b6579e9785aa84fc84714b8f08bfbc81cc7afb04068f78eaf5963f4ec9b7e0ca82f22b0560aafb246fa2318369d70349e65fbc2da050fafbbde990672b414be7038a87378a586995046a12b4caa04b831e0792ddb24d0d0abb59ed0df84a5bef7f2f217191d49ba6a04902f387de6712b085fc7bfdbdf8a94975c2f9f774abcc5383a439e9404eb553472a670e592a5c8424f2da8659c99a09549d02ea518399da0293a7afa1e00f793845e2801fcbf775c041175efe0ec631ec8ae6de3acfd74bb441ea4a6291dea72b565b599021bf6a885c4e1e1bed62dabe49adc36071ef4e38f238ec0e12f7facf96ae91e1012a0310c3b08638fd7430d7b26392bc66929512af4e78f6f8a6441579538379d8465c688a7dd8a96fb7dd84c3aa71311cd17b810ad66a768e678e5b0e2090608bbf7274faffeed4ec288372201e461bb366b413c8d3a0a7e6dc6d4b8a4a157ce7214c1f99ec0ee1273c038f2d4057d06b4ed28bb99f579bf2a2d6c61f29f9346bc0b204fdfb6d65d01877da7b39f762ec65dd27f93d279e34303a9df28f51ff49846204970bc1b633b360fa6a83f513047ddd21229104624896253d28d2e06f44a15a1afbba0938129dcdb1141074a65b74853b433a37202d381dc304ee02c2021fc2ba51d189d509c07d7cfa08437c928aa2be1edbd99425324af4d418c13fb766b3d489eeb52b2fcdfe9b64824d8e050867c81c1b9750e19246ab1c6d2aeac86cf97d96b0d32ebc0defb2ffd00c56865baf0de99f2e0e29da8c9cd049430535fca5296b5123931e91fb646debefbaf25c4bad2d21e03985eafb9253947db4587f38fd5db0f4ccfd96452a7c7032408fad88eaa71f9683ddbbbd4f0e25f0146227c9cd9fc01ed076e8491604e8e1d9feeec2ed1a5ea6689a4fbaa96dd5110aacc2c59955998e1299f219caf51dc09de65d0ee94c11643b5b381d83af3534409622757ffee4de016d03f0124b112d4c5ec3d08b8c9d9e94dec2d6d0a4abfeebc90c0a81a730e82fc966bdd0bd0c52ae9e659376f44b21c89a6d17a7d408617dc916af95889535932e3e96d7f7be7a54d99169477c2990a53a98f6447de49219757ad8b8ef7b099617137ec191fa97eab214214b57e11374fd6329360e49603e05e0d3fb4c07bb1b60f488c63aa3b9c4e474359752476f469b19518202ffccf0d4f57d1f5da35aedadc6c2be05f640e446ed91d83bc6b7ed6341bbce7e0fea0a86ec0603588fc9064bab3080e98f670ce5edb8c4a40a36ad3805434746a5496d996163bdecf93382812db1eac7a3f0d46160e68e6d063174fef73da4151a9aa7cf226c98d55af28b775ec74ac407059f9f68be3f0f4670c0b443ca1f4c3445890d10c8ce86f9f36ebd469d420aac0edb419633f3becedf2c5ff3f4a0500efbac32f07a2a72b601558bfb57822bd91b75eb9647d2269cf78e39536bbfbae82dcef633ac65017561a332f85a1a64e29afd9e0ab62be3169b36de34e683af94ccaa0a84ce732cd1c62d456ad0134e51b602b8b8aee2d7159be05dbbe95cef0be3713b9858bf7607728f0489a4b614507dd2094ccd992af5043c7ff461ef1b20e11941406b28891ef563fb52f4ab9e7a56706625e9ff92868df2d0c84810ca3c849d099b071425d79d553f3369a13326504bc9d51e80dfcd32c97d8cc0157f356849439a5e344f61c33f0b4411ba14475b1a45480d13b86beed037249dd570b41b77b759364dff2e16f7b8fd69def82e0e4477d00dd32d2d629dae77f00b272ba6bbae173f999d4ce1691e79cef9ce20ace20931d9b64be6f15c9da98f06b75019a198510636c6f4ae64823965a6d0d8247c82d6cf38f2901a306619c8feb653ce53f9988c5d5cdb36649d8c05938002435b0f9dfbb2ce4eaa508a6d12b41bafcf8f29584e27880cb8ca1ef493e11b5950bd0294efc4e916bcbd280ade12aab669f34cd1f5ad04349b2b5feeb603e9b31ba32d729bc319ac93e2c7148902f50ea86c513a2125f75da1fee7599e72b4840179113f32596b851e286e90b57ca10027354146f47c343abad080403ac61bc019bf36e5729a0af75f3670c7029fba0e51d2065b4b65a381622a8b67a58754d7c10155602dda4835cb5f0d0c44a084319b97a5db8deadc60bfe3bb5052b7af17f0181c84959c9fdeb1d0605c2dd40468c86c1465daaf013e6268ab54e4430dbcefa91a5680157d47c562b85c48b1db2661319d5ba54622f5fed787036bd3aac53f1ffa3d9c4b2c3bf79668923c65a28bbe764b79c87e78cf94365bd1ef3e8d3715ab15613a64c47f9af21d7ab44ed9492846f0af09e14a4ab9ffa57215330545a3f80df2fde8c3af6b695036626598a66d2627ebf5b8a4dfc9e95da737d754bb015114f02cf84b933dffaad0b67d8e97f53d0169fea860ee0412b20346d9cd1ed220720ed02f6138672ad4f22f55f6fcd96aff920e0bb8f06b4a897572910a108eb7f7e04aedec317442f2c3787fc3e974ca9c5c8443a1e58b0a8276ad77d6e47d557cc46c6db80f2a3d707b75d1fd176143b26ac8d50e630dcd148216322b5f831da41189931ae00ea98d492a55072924a70250947f43944f8e50123b30dfe96ad9019b3ec27395839d4f870e930f4170dd3729d729880d951610278c0a865f6db7b8253004556a1c31dfdad8969e96e8bdfc2b97f16962d41d2b832185270db5ab1dbfe7fc71548b10097e70db96d3a99d909a505ab40a1408f565d9f277dbf16cb413aeb3f74f205446605b5377243a3ab96327a504f45d4cf43eb1c1d6df44f7c1f13ed7cf1d9b2c2d8025f18037122ef277bbe453fc63c7098af60919129ff6ed8b5517a85ce3226f1278679fb28cdff22916424b9e306b9c81463cf3c56285f9ceb5ffc8c01df99b37e34e77fe19be9c6130909862efaa7dab4181a216c698292504c3dc6da98e841711c0407d318968ff873d248d1a9a1132c08f3cc83a7a17203aeca51ee34c8aa4b2bf726b7110b49f760b3333793efd923eadbaff698d61dcc676f839edf5723dfb90635ebb722d82d44142b7c2c786c42de6538e4ff3048c4115392ec58c7964350cbb883f5306c3061af2602c022375521b90c5f3a3db2cd58c86bb907c9b31db7c7e26524ce68c9217839b858c3635aed88a9ccf4fabe3c7fc149fe67ac7a88d9b0aff2635a6dbd27922791d40ae32c32b47243f1021e0507f83cf65b3fd7bf09ebf7638c7e2d333f9f7724640d9a6e9dd12a11391d01f1151d5798ddb3c42fec4c4f8f273ffe87716eddce2cffce211b06d5a1e8bcd7c80a1d90f8db4acad01388e7b81c63a3720cdb437b832f3f6b82bd0cf353969a3ed636e98c00d5d99a29478a182c6d6ab73ecc2301965b3382c8993ffc0edd5110d2e1a5d60e9ba73743bb51c431bf82ab1d4e9f5f6f287887016ffe66c6f93a725ef3151615000b129251f78255253a8fb84a978ad259ea49504e6266140ee358579a0860d7b892208516d01a32adda2466d9a2bd1b094273c61cbebde0a621690e7719fcd65671ecc3d7f635acb7b33e5315ef8bd01fde93db498c0aa43f58ed843ddad9926cf1f1e59fee0c1cfaa724b147997d86b19c76e687aa0d2fceb81973b4927d68ca124fa61015cebccf507c4264632c68219fe14d59419e0c4652ec036348909005022e391e78f7911038950e49e3cc6974f92b61a5b2e726f418f5ed91aa76a17457c6e47de5daf27527fe628f19ef46c8e93c6a659db278c958cab4cacd029a4ada676a487bdbe6d5f15b1a580fa07ee94fbf516528bb47c410cee8e3283848b199958b094216fd56f1ae44a7c4beb7282d14055ed49f23c728e95a0939cc537da51541770674715e05440b8bd19b50b0dc7dfb350c69f14f794293e97781143ee8fc7afb0876e0b9d3667e39f4467442985051fbbbf666f47bc591e502485266622e5f93cc823b106fb99cab409bfbc9c113aaf2fe2849cec800ec1c01a04639cf543ec8eccfdc9897da91ac6cea40cc25ffd850dc0ac87b0ccf3e8b63cad8e2aa7892fc4ba5f979037a7e2bf41c9a743234e2ab6169f9b0153f8d4a403f0c4133021658083e665428589465b60e833ce3f5980f8f1ff8f4663c1cb928f7a30af8d688b9f5c4f27751ca389198fa02696bf56e3fe96497bd9dfb79aa51ebea48b96348391d441eea371caa2b5eab68881c1c5298fc95ad9794c8e42e34c59491c3565b8f77010d8e7f66b67e0bd02886ff6eaf80731451c36ed825b162e037f7e820394df93e2874fa97903349e7a98dc5ea6b7962cf701b2c32599350094680542aa1497e101ca08434102970d5a23cb0b37dc1fae1901e68c653a40c17538dea46297b0d30d524f32ed98eda1caa89ad9571fd86cd75fd01a552aba84241b1b8e8d7cf8589c17bb95fe52d1633e9b77585c11f07efe4526788b7590486888c6517d3d0b77d64a1d4c78727c7c6f1a9b71a89c166380c1f6d9b0c27e21ed9958c8a05addd4bef4970a9a17fe6911942ec4630ca58020b4464552e802128000497a513e6377a74cf52ab455d77bb5fe4741b08fa20443937e025ae55a10020c04e019a3873ee0bd596f658fe1e7a8e7dcd2dbcf942efca665833318481a51b02ee6ab62a5b5aea421e88313551e0ca86b73985610940033843e27ab86b9298432251f3ae8f5f2562c970d91e52083274945a8975e8a1d8458adf3e49f6c4524752f12a83356b3f9663745225405cc8300be67b36e4fe804f6686185010ee5b938527907974678649637fdf46f11d85d90109e492c6eb7d3d414b45e875699a4ce5d4198ea1420053", 0x1000}, {&(0x7f0000002d00)="f8f40050499f100ad2f9014c2da1c0e489c80e00c0fef6e3759043d0a3f9ff48791122eafe9565dbe2b7a5c6fc18ae340449be73", 0x34}], 0x6, 0x0) ioctl$KDGKBTYPE(r5, 0x4b33, &(0x7f0000002dc0)) ioctl$sock_SIOCGIFBR(r8, 0x8940, &(0x7f0000002e80)=@get={0x1, &(0x7f0000002e00)=""/116, 0x1}) write$P9_RREADDIR(r5, &(0x7f0000002ec0)={0x49, 0x29, 0x2, {0x8, [{{0x0, 0x2, 0x3}, 0x15a, 0x3, 0x7, './file0'}, {{0x54, 0x0, 0x3}, 0x7, 0x0, 0x7, './file0'}]}}, 0x49) 04:33:59 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x6) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r1, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r3, 0x540d) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) sendto$inet(r4, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:33:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) keyctl$invalidate(0x15, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x9) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f00000000c0)=0x3ac00000000000, 0x4) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="3dcf34d79dcc6c321358861d93089a759255c5217e5949997429d09ae330b823b5adfbd636c7e557a9051cad366daec5147dd4ac00cf88ed29f91bb12f09d63c2a02063c16bddc68e8053827af1d9e3d7f35a3ebaefd37e7ae315352c753df3ec7550dc4d8e3934e26216c497a44236da2d2944948e7827111b0962d8010b70fb41cb91b563e84612d03feadefcd71bb50a96d84697c536d749128c497c9fd08e9997b8f43c2e82f372167255b6e1a681887e06ac80d6ceebe1a44df9dbc386a13fe7c73113741cf5b"], 0x1) fsync(r1) sendmmsg(r2, &(0x7f00000002c0), 0x400000000000174, 0x0) ioctl(r0, 0x2fd, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x5f7de2bd3a94aa97) 04:33:59 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x6) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000400)=ANY=[@ANYBLOB="6c08477802fb9dfff354809859085b5a3584d1dbd5349a59c799fed071e89e7413a6629dbfb2b60787d37571551f7223e3018af454fe5d05a6536a78dce6974557e8c2164940668724b824abe2114a59c6a4f5cd757940c5"]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r1, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:33:59 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:33:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) gettid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$inet(r1, &(0x7f00000000c0)="c97665637a7ed2f762bd32eb3574478dc3668116f81da77e3aea8903c6eaa2ca9c9625ff2ead487587b24758caf156534962f82cf12c488aa7c57ca843a87a59c1bd01d2f3456cd8471d59cbbb1e14d93719833512d790f4735779978e8b76e97eb7b32947c4acd73f64a8dc5cff942c4a47aa8c9c72b1e5297e240495cd6e10a70f20657b4812b8b8c2f44c3733f3ae63065c4de55032b0117b6f8ad6f393276ea46bd18e566246e5fc527b4a7c33fc527d834bbaeda3c4bb5812d591e5a743788b4534c401034ed931b54a5381c1cff072cd3262c10efd376a42a5b2e39ed08ac0ed5b978853bd3c681c22554c09cb1e559f", 0xf3, 0x8000, &(0x7f0000000040)={0x2, 0x4e22, @multicast2}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = gettid() bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) ptrace$setopts(0x4206, r2, 0x0, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x28}, @broadcast, @loopback}, 0xc) ioperm(0xfd, 0x83, 0x1000002) tkill(r2, 0x30) fcntl$setstatus(r0, 0x4, 0x42801) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000200)=0x8) 04:33:59 executing program 0: r0 = socket$inet6(0x10, 0x2000000003, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000040)='\x00', 0xffffffffffffffff}, 0x30) ptrace$peekuser(0x3, r1, 0x7fff) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="5500000018007f5300fe01b2403b7bbb0a60000004a84302910000003900090035000c00020000000d000500000000000000c78b808823090000009d566885b167320b00dc133cd54400009b84136ef75af9384040", 0x55}], 0x1}, 0x0) 04:34:00 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:00 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x10020006004, 0x1) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000240)=@v2={0x5, 0x2, 0x13, 0x81, 0x65, "b0d5a98ee0617bc12eb4efe754c1ca4655b93937da7f70a5be3474399f7bc8ce9ceca38b76d85a2aa49566fae18d8507afc7080fe80f3b53e105f5bcea5e33a113b8cf3e940c3d496eca09c5f48bef9f9f64877bd2187c60fba58f1ab69c5db7d1fedca673"}, 0x6f, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000098306f882ac3f68f4d04"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='msdos\x00', 0x0, 0x0) 04:34:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x100000000000011, 0x2, 0x0) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) ftruncate(r2, 0x88001) sendfile(r0, r2, 0x0, 0x8000fffffffe) 04:34:00 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x6) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r1, 0x540d) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) sendto$inet(r2, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:00 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x6) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000400)=ANY=[@ANYBLOB="6c08477802fb9dfff354809859085b5a3584d1dbd5349a59c799fed071e89e7413a6629dbfb2b60787d37571551f7223e3018af454fe5d05a6536a78dce6974557e8c2164940668724b824abe2114a59c6a4f5cd757940c5"]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r1, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:34:00 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:00 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[], 0xfffffc6a}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(r2, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) 04:34:00 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, 0x80000000}, 0x90) ptrace$setregset(0x4205, 0x0, 0x207, 0x0) setxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000380)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000400)="eace7e2556910f1eb8bf1c5096f7e677396e0c9cbcd4ea0623f18e4c2420f52b719475d9953f0f84273c2f82ce5990431a96236e188559bee5b7bec5fe771bcd9f44882788aae8b1eaef0cd83be9daca2e8824bb32262d0b74b174d2f2a9d27346c13dc24af0c2c191a9", 0x6a, r0) geteuid() r1 = gettid() wait4(r1, 0x0, 0x0, &(0x7f0000000500)) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB=',cSntext=sysadm_u,rootcontext=U']) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'L+', 0x3}, 0x28, 0x3) ptrace(0x10, 0x0) fchdir(0xffffffffffffffff) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) 04:34:00 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x410980, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(0x0, 0x2) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000100)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$RTC_WIE_ON(r3, 0x700f) sendfile(r2, 0xffffffffffffffff, 0x0, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) 04:34:00 executing program 2: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000100)=@ethtool_perm_addr={0x20, 0xaa, "3fa545fa7180c39c6331c0082c7d7a83225407b8e5459dfff760fb89e370167c803764209c2bd6aa7bcca6e96a2752f9bd27ace7b01ae27d7f8b8daae325ef8020c9b27fc6bb5cb082edf1dc24ffd16ba7edfddfa8e7f15dad5ee045498e2509cb3e42dea4ba8387c9d1f3c86bcaa6b93da28ae33c48b600366a92c15e3b7d48d3e395d4aadb92d24232c97a87242989117e77817cbdedee6726a30b6fc2e0cecd4ca48bb82103ffd531"}}) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000008000)={0x4, {{0x2, 0x0, @multicast1}}}, 0x88) mprotect(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x2) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000000)=0x9) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000008000), &(0x7f00000000c0)=0x1ff) 04:34:00 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:00 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x6) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000400)=ANY=[@ANYBLOB="6c08477802fb9dfff354809859085b5a3584d1dbd5349a59c799fed071e89e7413a6629dbfb2b60787d37571551f7223e3018af454fe5d05a6536a78dce6974557e8c2164940668724b824abe2114a59c6a4f5cd757940c5"]) prctl$PR_SET_DUMPABLE(0x4, 0x2) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:34:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) faccessat(r1, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) utimensat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x77359400}}, 0x100) 04:34:00 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:01 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3, 0x3, 0x3, 0x4}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x0, 0x1, 0x4, 0x3, 0x7f}}) sendmmsg(r0, &(0x7f0000003e40)=[{{&(0x7f00000000c0)=@nl=@kern={0x10, 0x0, 0x0, 0x30000000}, 0x80, &(0x7f0000001400)=[{&(0x7f0000000140)="708f145964a45680", 0x8}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="753e02cd46b046c0ed3f4d1bd202dab56d8343c3e7d27122e8efbdb70ce021070f87edba67", 0x25}, {&(0x7f00000011c0)="6e1ea63fa36aea1334f8a54553ace192856eab7bb58123e35a3c365e9672eee169657a730012cad9551fabd26bdab0ffa1bf16f9654aa82de7178f56605851f8e7190e073f012be5dcfe3292e87e8df3ee1ba743186dbf7733b1e5523cb9d041ef6065ce8e43be9879a5", 0x6a}, {&(0x7f0000001240)="86e9366cba8297774e68f1acf834442cfad11043cb94de9cd7602fd1401fdc0994130d42eeb159a05d45dca9c7797861a7f8adab3c7fe8d5b05a25c79001901e8a91823fd0f98c654915002f96035af82f4a45af7267939d3aebe5f881fc2a6d9fb91aace0f522cd6a4ade66aeb05ae4f8a3c0682283c3533758dc43240e0a76684ca52a42b08d6e6d15b6799ecb928e6da7678407ca310ec1f0bafcc5a5e92c59e5eb7e4794a97cb6273044c312d016a61ccaa0a9fc6b61680220e7c265439f967f1d12e7c8f0e7bbd15d0e606d89d55b78f16d70925f64dcde1efdb2383bcdd20348c1f2049a3c038cb9382b2ffe54c66a09ef", 0xf4}, {&(0x7f0000001340)="334b209c19d8858a1a4d15c6b53ac26afdbd0f4c0168049646a897991cb831863d8e51c2d4a76a0c3a4e1d1b9e0e754725d0a224d485d6fe2c6e6cea58750135d102a463565c1834dae1f0627f88899dc2bd59d0c8bf3f6a5c86b3bc48bda66bf517912bf1356a09109d5e5551a492ea23b97e4fb775d2cae0d0c6d50e8c40ab3f", 0x81}], 0x6, &(0x7f0000001480)=[{0xc0, 0x107, 0x9, "f3b2ce665e1c912fbb8a944b836dab481637704b3e8fdbb363f7f820700d66865220ffae4404045ace4a13be32b193687478a961b8c7d0166d25aa54285d32160b14f40eb08e785eea90acf3e5566c5d60039af2c2703fe15224545b477d60e12b279e3f86e3eea5eb6da0bfcd3d72676732a8052617c1b1de7182ab3659f0789b2eef02562f7bd94f361bfd092f7f2b30aec27dc796656bac3b6f70f6a7385933b297d1e6bc38da63fe"}], 0xc0}, 0x100000000}, {{&(0x7f0000001540)=@ipx={0x4, 0x6c, 0xe3, "1aa3907ad715", 0x7}, 0x80, &(0x7f0000001b00)=[{&(0x7f00000015c0)="5617e18155d376f5ef34f146bc2077cb551eba5d093d24257a9703e2ada220e6832ec284e94f90d752db5ef4de08c3bfe5e008858f15b21db1fddf9fb39df829db877ec084e322304ca81edc05ad7c42a39cba603ebf71b7bef0276ab5bcd8eee5bd399a29fd8557f9b8b3784d5d735d974514ab962e7fc6c70aa3f8e8c55599ce682b678dd19c6df40614408b80ae0eed72080878eaddade4b3c103af0267ab5c36602f40e0b44ad599faa5b9bbb9fb11ae5f2c565b84c4ae8828c700f999740690570577163d3e93d6b27c264267f320967e4e24a5c6d83611cae8e815a9eb921773b0", 0xe4}, {&(0x7f00000016c0)="139ecb9e68d407f73a4751b8d50aeeaa52056c85e8c3510e3f81ec66c32d93b09bc6caa10470d81a854f53d4f0cd563c7a8b36dc88dfd8d9a85193ac0b1fdee58e32b4e520fd4cb1962ea8ff65a8bdd566d67f4acade367ec5f5b7e3ade8e572ca528bdfcf02332681c79d44d7914ca3629ba92ed1994e6b22ad98b44b8c30f4dbc0cf8d86c007616bd80977b8e9e1735721d988794d5be9b308d6f880963b681bfe6f0f95b592b9076734c647f8bc8d2601408982ecd397e67f38b097e32c4ed5a50423cf69355487aa0b7a65339aaffe5e93ccab38212f32a5726626fc6cc8a96e03b086fa1605ae6815", 0xeb}, {&(0x7f00000017c0)="d601ceea86bc08e884a26b8e1358ee8d06f7ea2d91594849c940d08ad19d579eaaa558b35e99dbda3b6f29e34d78cf96bbcc1cd4b0a2ded83bec3c2e8443953e06e3e7b7c3d3d1849b09c948cc1b6a56390377e9fc2d84c1390c8b4022796844fa42e35996402c2633fac64a77f9b4e4cbc3ed255438ab25e43737e098", 0x7d}, {&(0x7f0000001840)="fe20211e413601afc5187d98a81f9aab074193968cefeaf21019c14168f6bd89b0566e73c3b13b29e1ede49a9b8d61087ab9c5337fcd6782101bcf94115b879648591919de0fc233adbc958ee6f54a2b1beddace1f1d8f3068153a823999ef5754e40cc5cd6fd98b42243945e4a5a462b9f1a8b7110b1a09ab7fc777ba1efd557c3390b312", 0x85}, {&(0x7f0000001900)="4fb0d416937ccdb71943f6d5ffc7478997938fde961bd1d96ab3dc9def95084bb0749d06eb01dd3752f57bf1ad045397943780d84279ce2b1a7f7aa4fd78a3d871aff3cc858abaac7c4576bd", 0x4c}, {&(0x7f0000001980)="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", 0xfa}, {&(0x7f0000001a80)="558472badd2018090c6b0890ae4b30fd7a72287eb6571e3db7b5a846070740cbe3fd2ededa3aae703f0b7128c987c03f49d3da4fa347518f90d2e2bf6fabf27afc881437ea70523d66dc9a7cd31c51aabe91cb42e3949434ecd8ef26f45f6ccaf6f7d608cf56f98ecd56b710de53981f63850ae382a1c292874ee402e2ca", 0x7e}], 0x7, &(0x7f0000001b80)=[{0xe8, 0x104, 0x1, "43438d2931eedbfa5ed70dd6c72d526d698ed861141574e7e3c7f65dcc2bc9f50fd577baa4688d8d7d10cdd14898d01ea4093e9b449150a60c6a91c2f399f9f7d1fd92d7b0110e86da5ee89ae5fffe270690761f0e6454eeb21c315b004c627e8554e1340526509a494162d97e034f25b3ef688f08641bd862e8f48d3e97123bbef26f8478007aeed0c26bb237ab85da2222d3a42030c4c2fbc0114635b559888f13fae3a52f60eb48df5378419a721c43c41d44796e439c6a6e86231f93085ffdfd3eea50f0f2a06186e7de3cd7c8218817c24a"}, {0x108, 0x116, 0x5, "5b4f2ce80c392ee921af0b91402d6ef9ae604b79e71dbf038f1f77b92851c4bac4df8af1741fab23b11f7926a2b48d5bfc0444c578dd7415f13582d4282375a735c63f5e5110a62b882a43abaf8061b1ba9fdf917e1400ddfd4d3c155788e95ee199063d81eacedfc1dbfc440d40a1496a573e64d9103f7ca9bf207c348d6ccdb9bd85bed50effa30c560acb4da7f42f37d1889fd1848610577a807a36ef601c3c9fdfaa88007b1248ef744e55477c2baed2c7747b89a2833ba82b1ad61983bb1487fa63666218db7fb278dd1c3d240fc4e35886b75353c466ed5f2ae8177222c2eaa7942a15705338c78011313463175efc7e"}], 0x1f0}, 0x8}, {{&(0x7f0000001d80)=@nl=@unspec, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)="4942d0b13663f247552d13385c0ff14aab11f872ef1379f9cc1eddea6c7bdcdf38b9d273426edefe4c63f9c75c70a2534a97c24a60201225203934b1111306cbc2d89fc099952e1ed48300c5b8bcb8aa930db66652b07c702280014c7b057aef7f1057ef6fd1ac204083581f97f84a7be5307e081f4bf0b25deb4b8d1944f74a173f9b82f203412e58a31df78a0b5599202627139736231418f33ad2c1ab7420f82de05d178b28ef9ee5f791480737f8ec5a43e8e924440d62effcdedf183b1625a5a3c507533ab392c1838a0271ff83ba3c8d8bda86717d2f6d64940e783e70714369ad68eb58", 0xe7}], 0x1}, 0x80000001}, {{0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000001f40)="fdba1ed56e102a6906bf72fa2a9abb700a763a2de2944526c6f1deab6c2365f285db83230c1728d34aa244a6a433a00c6dd3b8a95ab867bc3de5bc765154fd979087e84c42e9ce674e8090365baa94c0884b700218c09bba98ef4fde94e361b782e370e9088d29b898c6b013fabff5c29f80999d1f2d114279e9fe2850ca8a3e0d2fd43c3fb83c81715bb30f5b7021f228cb6fa1d2d6", 0x96}, {&(0x7f0000002000)="a79ff34f5b04145f66193363db78461bffb28a605f8478243d62ab3f5b9fe952235c2fc0d8bf5f721769263ddafb4f1931661991f397c5d3b80306e85f340a1f81", 0x41}, {&(0x7f0000002080)="640a7dd647cfe473b23eb7176f3fb8403ffa629ad92a7dd33a38b23c03a77642f9e33a31effcb0f5947b6e8fedded2155191269778cc66c5e35f7fb182eb20cdf10f37faacfa76d60eae1c4049adf2326787cc559eb603d584f445116eb20989fdba5760c0971e96b9e24fd4b008", 0x6e}, {&(0x7f0000002100)="e928ad01da2014c2faff9bb297ee33da458682b6b317777d1ada6198d798216594981b752bc5161bc585c789105b25f332e5d5197a65bcfd187ebd55c937e2233ecdadeb2d219f387f98f114aefea61dba82123af090db06872301477361ccef1c9da98e85edb664a03103d3aa459716c5d728a1ae842b41a81aefcd13db3f17c72e301e38a9a995fa924863ad4b490ffcb711c46a61f134ec4d4e16cb78e509e6fc801775288890aac8c26d095fde67539299bdee42710e0cfa5db123a0a32357fac65ade9a95ed26c475c6e5cb2d593a7b4adc852f56c2c13e97ec9911c670b7168a355f8c385998b18e3fcd672ebff36152c61be6703a19", 0xf9}, {&(0x7f0000002200)="df244cf3aa2243b83bac1fce5a6f116b257a65ff90e6e2cbd649313e2b00bf0dadc188ee4b4ffcbde496abbda4e0cb3f4344bc86571a739e9837dc3fef0f280c2fb58ec5009fb88dc2d41e23b95664", 0x4f}, {&(0x7f0000002280)="8cdfbacf549538700a6ea0ce18814b0aa83bdd43ce833d085076", 0x1a}, {&(0x7f00000022c0)="502507452ea69f8119778d7be01c39f7b3e7a4", 0x13}, {&(0x7f0000002300)="6558c23ecdb23d832104eef564a6ca55d55e055b7762e5166ceefb7308bc6b01258281663c3703222df5ee0a1bd4ea1d46629a4ad80300d7c5c775f769bf63e077cffb692e9e10f75f1ebae0e3786282ca112f811c75903c3ff5dce077bec51e0e334ee26e8e8acce1c0f9920775d0ed8d5d5919d23e7611b020cdf70da729228d3b7d43ef20a9ec550665c6221d2f2edc123f6930419b3ce95df03d3bccf726275eaf329c2c90bedc83ab2e7ab3972646fbf634baa55adae42a783275ab4352adb82aa26ebcd184007edb15b9b2491d606050ac588e00738e", 0xd9}], 0x8, &(0x7f0000002480)=[{0x50, 0x10f, 0x5, "80b0707ee5edc260f9829ab5856b5123b8eae9466cdac6c115acde8ea94165e4c2080e0c973872af7ed228fbcacabc4177cd25d887e49702c08b27"}, {0x30, 0x118, 0x3, "2676ee145f72114242bf2723756850d60af187c7d4e887013d"}, {0x1010, 0x117, 0x1ff, "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"}, {0x18, 0x108, 0xffff, "ecf26f45d1"}, {0x100, 0x115, 0xfff, "1354a3c1059c000d1923470c73f2e2e4aabf269d755fa0e1fa7190bd6a7f619a4d1754d8f7be00a9eb4bd9fd51762b15b8e215de22532b9d44a9db37df692578d7f06da5d2ba644068b3191b28dfce01fac012844256658920b74f9c7a8e0ea3ced3017de595e3aed1e7699b969bee77db51932fe14b5a8149450b547e2350915e4e5113ae8a7b3b5e037fdf29f784553beef63d820f1ed3c724fce3b37c70e885ebb84d7a5d1147081aa16219ce6269dfc8cbc05fdd57e6438bf4b449325b7eb8583e64eb1ddca86a400f2987d2968ed94c058dfb49a90a762d80faca7de06d041d6561fd1a07034a4c"}, {0x40, 0x117, 0xc91, "3cdf81501b46bbba6daf7342b9916f3e6e7d3dbffac62f45874173127a4490e76f2882e3fe0215f95c684b77da153b"}], 0x11e8}, 0x6}, {{&(0x7f0000003680)=@sco={0x1f, {0x80000001, 0x3, 0xc481, 0xffffffff, 0x1f, 0x9}}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003700)="75087953390e0870db82b291f23ca5a48444e14add634e9032c63ad8d4963492bdd15e60eb4351ed27959daff1cc3c7babb5fbabe51bb11c9b15785e9f394fc4b82c13f5ba4f45040d817e1504bd63d5367ef4ab80a6157c3030dcf88206a4cbabbf76cb0323b9db966a63b7adc6d107e0a0f8b49f6ec9de8cfbdb4b8c57727375e29d637805e73889e76bebce594b5e5d9ab4dee4595a", 0x97}, {&(0x7f00000037c0)="2c39212032b460d20406683d99a3f9f3f2a2b9bb3670a54fec785c47c821914480de3766a96235514cb042d10a1e709e375e63e3835ec42f346206f4f3827a7cad9e199bd30f074754a623aca26de5313fdd3647cf0f51a98999debca88ba591bb330f578a9da6440658731be5b174ac", 0x70}], 0x2, &(0x7f0000003880)=[{0x100, 0x3a, 0x101, "1b9ba8500752dd869ef5d59eb45cc4e8de4a1a12d09297de7d09ab5bb2626f66a50aab7bd245f8d9c05490338b4f4129f38c831d31599e8f2d6b462e1e991d46fecd9403575b22edf6edcd90260fb4b84a033159de18e9539c922911619f1131b6e8fd9298f920525025ab4c32c3be5a3ddb4deefa16d3add278627d8c6f893c7378dda86dde781e268197979160c9435575297ab37e327abc7a74662037a00382c2beb30197121cb33043a1c28ea247dae982e5c9544251cd76607638156798f7bda3c459ad8c8dd4f2b02f2c84d4608797e20e9b33a3d75a530b53bd672cdf1a6923a4ed359ec85280e5681a"}, {0x68, 0x10e, 0x2, "101b0de5b283953216abe0ba333e37131838b498097808ab2af30215f7119b7f2cf2c2b9de7e42d6dac26f2f63b3b88370e98e9bfb63164a98ba507691d4a9b192dece7c38a8f252b09983f688841147f1"}, {0xc8, 0x103, 0x8001, "5f863ffcffa632d738aaf374a0e77f84dc05f013aaa725fbf31555b38c39c75398ef5fd474cb074cd19167e3df5a6fb539ec2849da8bdae56e1cccd17397bef28de266d1b4ae9d1b2d173da6dcfa73316eac80584ade3933467789da12366de6796c79d39ef3bcabe5e30f8b6d2e42b5350e3c3cc8b7346ad9d97b1f4df08062a8721da50ce92888d0948887545ed1b3d0032fcde803a95e5a7491560a25d30c0bdc6023a543173ef942afe3506933c83e"}], 0x230}, 0x40}, {{&(0x7f0000003ac0)=@nl=@unspec, 0x80, &(0x7f0000003dc0)=[{&(0x7f0000003b40)="189721ba72dd68e9fa0f6dfc2da470afb311ad6f8e343917", 0x18}, {&(0x7f0000003b80)="e543bff4ae0c9afa8792c2931834d920bed63d4b0ba9a02c344f3922d4d4abc4d703254580ba8a22056ca2", 0x2b}, {&(0x7f0000003bc0)="86ab2e132694720167d81c839e9b0776ed07b85d7e329a97ac9887f228b1d056a677c419324372cf6a3457ae34", 0x2d}, {&(0x7f0000003c00)="5de1a80dd3e6f2d26b46c7d808f720148cb5ea18726452f5e53e88beaa9c6aac5427f25f27fda48a4dc46aace7716344a8169a0cc81f6a7812659925ee1968f817a6cde5aa098fa42f2510ea9a3096e86648055bc1695e0b165096c3326bbf2061f452caa9d4fa2e84826247a57e1dc47aab31598de791c00d73733f59745be0", 0x80}, {&(0x7f0000003c80)="2b2b53b6ad088a13a281bdced0ce0bbb384844ecdc7244ad4846d018182793425db43c52be4f445146e888456a1c6957c55d281753f9d0984fe44379814f08f7ad1e9d4a7650f13c4f5d1ed5586adeda82e4", 0x52}, {&(0x7f0000003d00)="f29d3b3e213bb6603632d522153b8c839de7050f46577a86b9c3e17acdad954d502f087181c3ac336df00f7f6aa9d547791cc7367db1584173af924290c96f77e3b337da71afb7a052b3bfe3e123c4d834e23e2ef081d415a0c9c8dadeacd9aa7b616e12d1e26578995ba3d4d31cb75ad8e6d9642d3aebfa5ffa8527555f437ccd78009bc5809eb2b538bb9c19b3f64071e70445614d98d75e08d14c3dda42a6aeddcc4181d8c4944d55be68c67361fe39e01166fc05593fef473d806ee0", 0xbe}], 0x6}, 0x8000}], 0x6, 0x80) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000003fc0)) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000004000)={0x0, 0x8001, 0x1f, 0x7fff, 0x9}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004040)={0x0}, &(0x7f0000004080)=0xc) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f00000040c0)=""/4096) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000050c0)={'broute\x00'}, &(0x7f0000005140)=0x78) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x4) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000005180)=0x4) fcntl$notify(r0, 0x402, 0x8) r2 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000001, r2) syz_genetlink_get_family_id$ipvs(&(0x7f00000051c0)='IPVS\x00') ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000005200)={0x400, 0x5, 0x200, 0x7ff, 0x4, "bb49db0808590e4832afc294510893e5942b67", 0x20, 0x1ff}) r3 = syz_open_dev$mice(&(0x7f0000005240)='/dev/input/mice\x00', 0x0, 0x8200) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000005280)=r1) write$binfmt_script(r0, &(0x7f00000052c0)={'#! ', './file0', [{0x20, 'cpusetem0'}, {0x20, '+$'}, {0x20, 'memory.swap.current\x00'}, {0x20, 'procuserbdev+-{)posix_acl_access'}, {0x20, 'memory.swap.current\x00'}], 0xa, "03f98c825e84b49794e30b5b4328418a8783d6684277a6b9d86a558ef556e9bf235d59109014b7e6843ee282525ec18ec8d3e6086364c985cfb300e027a60e7e1a478e4bd9e5ea15eca367b0fcc81e2faaefe2e0cd979801d07696d62740143db9126f21a3dc2004d7c113b760ac34457db184fdd3f4f4a2c693b54b74d55a6fd5a6fcffdddf7fec8c643e566612bfdd062ef86d4b98227dbf1662f96ec2b74a86e6de27833251c545ddbebc289530b5e099b5c72a46a5238ce0f1d92b5a96185eb6c8"}, 0x126) setsockopt$netlink_NETLINK_RX_RING(r3, 0x10e, 0x6, &(0x7f0000005400)={0x5, 0x37, 0x2a67, 0x8}, 0x10) r4 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000005440)='/selinux/create\x00', 0x2, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000005480)=""/115) recvmsg(r0, &(0x7f0000005740)={&(0x7f0000005500)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005580)=""/198, 0xc6}], 0x1, &(0x7f00000056c0)=""/121, 0x79}, 0x2) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000005780)=0x3) rt_sigaction(0x37, &(0x7f0000005840)={&(0x7f00000057c0)="f20f5eb5feefffff8f8938016e48c4a10f5c9fffefffff8fa9689a08660f5d4a93c4a119e42fc401c9564a02c44259adf18f6978d1293e400f6421", {}, 0x40000001, &(0x7f0000005800)="c4a13dd363d836d2acb8000001004738f441d8d73e2e0fd2a303000000dc1ec442d1458d0f008020dd1fc423f963f0432e670fd7c1"}, &(0x7f0000005940)={&(0x7f0000005880)="c481e91672f466470fd069098f2878c33c28d18189ffefffff01000000c421f9e75df0654f0fae35087a00002e0ff5df66410f73f50066460fdadbcf", {}, 0x0, &(0x7f00000058c0)="66470f3a14c000400f41530fc481fd682543000000660fc63900660f3840450543d89305000000c461595c550ec483116998ad00000000c401a9c4e9986466440fec25ffefffff"}, 0x8, &(0x7f0000005980)) open(&(0x7f00000059c0)='./file0\x00', 0x400201, 0x101) fallocate(r4, 0x24, 0x968, 0x74) openat(r3, &(0x7f0000005a00)='./file0\x00', 0xcf1f828cd022ca68, 0x80) setxattr$trusted_overlay_redirect(&(0x7f0000005a40)='./file0\x00', &(0x7f0000005a80)='trusted.overlay.redirect\x00', &(0x7f0000005ac0)='./file0\x00', 0x8, 0x1) 04:34:01 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:01 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="02000000000000000000000000000800cb76e092d3f59382a7253588bb2d003014281ca7125466a10bc36e0e4596f3f4ec1ada621a3dd0e355b56d68cba2f3df4ca17347e3ce7f7fa4ec9867ed306b6fdce5f3f0391eac14dc3b83ffa57473ae4aba46dba00fc77852af8db46b1f1519cef3e99514c83771a45039e1aa048aee4c0a82dc0bdbaeb5b6cf450cdb6a4fcf44a8afce2abff27900"], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf43, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000140)='sys\t\xe7l_u:object_r:lhcpd_va\xaci\x00,M\xca\xe5\xe4U\xb3\xff\xb2:s0\x00', 0x2a, 0x2) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:01 executing program 2: mlockall(0x3) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = getpgrp(0xffffffffffffffff) syz_open_procfs(r0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) 04:34:01 executing program 0: r0 = socket$inet(0x2, 0x2, 0x8000) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="891e044d28449a42de5aecc167e54aceeaf1c3de1575c91873afd05d5e", 0x1d) 04:34:01 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x6) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000400)=ANY=[@ANYBLOB="6c08477802fb9dfff354809859085b5a3584d1dbd5349a59c799fed071e89e7413a6629dbfb2b60787d37571551f7223e3018af454fe5d05a6536a78dce6974557e8c2164940668724b824abe2114a59c6a4f5cd757940c5"]) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:34:01 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) 04:34:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r1 = dup(r0) write$selinux_load(r1, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) socket$unix(0x1, 0x1, 0x0) 04:34:01 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) 04:34:01 executing program 0: mknod(&(0x7f0000000180)='./file0\x00', 0x1420, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r1 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x22d00, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x3) r2 = dup2(r1, r1) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x20000, 0x0) getdents64(r0, &(0x7f0000000000)=""/13, 0xd) ioctl$FICLONE(r2, 0x40049409, r2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 04:34:01 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) 04:34:02 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:02 executing program 0: r0 = eventfd2(0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x320141042, 0xfffffffffffffffd) ftruncate(r1, 0x280080) sendfile(r0, r0, 0x0, 0x3f) 04:34:02 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x6) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f00000002c0)=""/50) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:34:02 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r3, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:02 executing program 0: add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000000080)='user\x00', 0x0, 0x0, 0x730aa12628eb3ca5, r0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) fchmodat(r1, &(0x7f0000000300)='./file0\x00', 0x148) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) fstat(r2, &(0x7f0000000340)) r3 = mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffff9c, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000280)={r3}) ioctl(r2, 0x7, &(0x7f00000003c0)="dd7700cf811380837cf456c912b8d670f48ed258b3eaedb714be3b0a758441fae59c8d5930aef616b722f17f34e5f4255bcce9aa9cd7abb9139dfa77be97dee01ceadfda0079b710ed9952d42236a0c785276493c8d05ed975861fc758d0db02460504fa4704b9b677ebceac86a328de4c4b") r4 = accept4(0xffffffffffffff9c, &(0x7f0000000000)=@nfc_llcp, &(0x7f00000001c0)=0x80, 0x800) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000440)={0x5, 0xe}) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) clone(0xf93f00, 0x0, 0x0, 0x0, 0x0) 04:34:02 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:02 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x3ffe, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) creat(&(0x7f00000000c0)='./bus\x00', 0x6c90af14b3c017c9) sendfile(r0, r0, 0x0, 0x0) 04:34:02 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:34:02 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:02 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:02 executing program 2: r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$selinux_context(r0, &(0x7f0000000040)='system_u:object_r:syslogd_exec_t:s0\x00', 0x24) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) fcntl$setpipe(r0, 0x407, 0xfffffffffffffff7) write$selinux_context(r0, &(0x7f0000000140)='s\xabP\xaa\x18cxystem_u:obvice_t:s0\x00\x9cg8\x15z\xa4\xbfB\x80U\xce\x83\xa0\x80\xbd\xf5\x95\x88\x02\x0f\xddMsu6\xba\xde\x98d', 0x10052) truncate(&(0x7f00000001c0)='./bus\x00', 0x10000) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000080)={0x8, 0x1f, 0x3}, 0xc) 04:34:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={0x2, 0x0, 0x0, 0x7, 0x8, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x40}}, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getpeername$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @empty}, &(0x7f0000000100)=0x10) 04:34:03 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0xb52) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x280000, 0x0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000080)={0x53190676, 0x5a, 0xffffffffffffffe1, 0xffffffffffffffe1, 0x3d, 0x6}) 04:34:03 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:03 executing program 0: truncate(&(0x7f0000000040)='./bus/file0\x00', 0xff) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x2f6d7cd4, 0x3f}) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) [ 445.904891] audit_printk_skb: 114 callbacks suppressed [ 445.904925] audit: type=1400 audit(1556166843.538:120): avc: denied { create } for pid=24013 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 445.942354] audit: type=1400 audit(1556166843.578:121): avc: denied { write } for pid=24013 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 445.955188] audit: type=1400 audit(1556166843.588:122): avc: denied { read } for pid=24013 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:34:03 executing program 5: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:03 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000580)="a2e6565b", 0x4) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=@known='com.apple.FinderInfo\x00', &(0x7f0000000280)=""/230, 0xe6) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x6, 0x5, 0x2, 0xffffffff, 0x8bbb}, 0x14) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendto$inet6(r0, &(0x7f0000000100)="ce841100001b000000911efc1fb35c22cc6dc37916215963e15504", 0x1b, 0x0, 0x0, 0x0) setsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000000140)="4b93c2b8dd97d91cfeb0881aa78a5bb31908624b1f29d9df5c36531113f7b4288e3c9499ddc4063bd88b8c0c79fcbc7223400c36afc8d36a7a0b6844a637c8cd149992a7dc0f89624305a9d3ffa03ce0349b096a34a3bd79dbc7ee7da17934e493fc195fab9678ae7d0d0230a29d8230a4c8284fa90d16b6a62be40caa36a3d83cd4c7ae5987e4f806320b3f5b509dd9da1037b9ce8af4b9b6c682924e10a38db931ef1cb8c72399da20fb7272e54d93f5029632e0d321184f52ec6ee1d85907666dff6a437f3106e64ad31915b7c52dc586f7b92f3af75c3e712f", 0xdb) 04:34:03 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x6) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:34:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000080)=0x7, 0x4) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r3, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r3, &(0x7f0000000240), 0x5c3, 0x0) fcntl$setstatus(r1, 0x4, 0x0) syz_genetlink_get_family_id$tipc(0x0) r4 = accept4(r3, 0x0, &(0x7f00000000c0), 0x80000) getpeername$netlink(r4, &(0x7f0000000100), &(0x7f0000000180)=0xc) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="020700099f81c85acedcd35d7db18f30b6e338b9558704aaf4467aa72f8e3767104547ca2e9fdbc6fce8ce42915b03ceab29a4c59cdcb18481f3dcb2162ac673dc3f5bf1aa36ad3024b692d2bcb59cf0264c03dc39584e79b372f9c16579242c908796628e41b862c5be2270275f0c84621f98dab7cfd7a9a091ec6e44656e34d1cbbb94e32d941abfc34a0da8b9f3739af61c8a705709629403"], 0x10}}, 0x0) [ 445.956512] audit: type=1400 audit(1556166843.588:123): avc: denied { prog_load } for pid=24013 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 04:34:03 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:03 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x5, @perf_config_ext={0x1, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x6) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r3, 0x540d) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) sendto$inet(r4, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:03 executing program 5: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:03 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:03 executing program 5: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:03 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) [ 446.322960] audit: type=1400 audit(1556166843.958:124): avc: denied { read } for pid=24096 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:34:04 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:04 executing program 0: mount(0x0, 0x0, 0x0, 0x50, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x600, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000100)={0x7}, 0x7) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1002081}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x20000014) creat(0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r2, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000280)={0x0, 0x8f, "7bf68cbe1a1415d974a030e5d3f6e9ad24ae011d7543fab5268dc44d5c3030adff4988946997f93bb471f502b0abc12829166b9fdc79f3aea40719df8297883429fe8e731234774cc5a487eb67dc9b62f3856054d15f24ec43d9434c3db0427ff39dde4f3f83a0274702c27631fd29a7c81e509e8e32a23e763e03427be38d85fb13deeb47feaf9a781bfae688d6f8"}) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/exec\x00', 0x2, 0x0) 04:34:04 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:34:04 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) [ 446.327630] audit: type=1400 audit(1556166843.968:125): avc: denied { create } for pid=24072 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:34:04 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) [ 446.328090] audit: type=1400 audit(1556166843.968:126): avc: denied { write } for pid=24072 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:34:04 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:04 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) [ 446.423830] audit: type=1400 audit(1556166844.058:127): avc: denied { prog_load } for pid=24096 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 446.651675] audit: type=1400 audit(1556166844.288:128): avc: denied { create } for pid=24114 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 446.652215] audit: type=1400 audit(1556166844.288:129): avc: denied { write } for pid=24114 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:34:04 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000240)=0x9) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x600, 0x70bd2a, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x40840}, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x41a}], 0x1, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x5, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) getgid() 04:34:04 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:04 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:04 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:04 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:34:04 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="02000000000048be949aae2a21f6c7a07e021f637cdf00"/32], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000280)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(r2, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r3, 0x540d) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:04 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:04 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:05 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:05 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:34:05 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:05 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:05 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:34:05 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:05 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:05 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:34:05 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000003c0)=ANY=[@ANYBLOB="dba4a09e6a7fd6d84e123ede30b3bbf4f7a2f4b6d1bceda359a60dc53eef1621e8ca5bec696e8ac7357564120487ce9fc0eb24c841bae4f1ab9f60e92e000000000000000941525f276c651c3d7ee83bf206edb8dd30b4513d734a297efcbc76964652c0e7e8f60002ca32f6bb757a43bac82a0e41797636ff11527ec2b0f90765a1cbaa38953fc538406e4d310567e0b1430f9e1495bddb62ca02ceed711f2a3186eb2f72ab3c5b7f077840922525de89782101d7f736c7a14cf567dd00"/203]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:05 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:05 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:05 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:05 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:34:05 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:06 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:06 executing program 0: setresuid(0x0, 0xfffe, 0x0) clone(0x10044100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc69123c127b8e9bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) write$binfmt_elf32(r1, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x0, 0x1ff, 0xeb14, 0x3ff, 0x3, 0x3f, 0x67, 0x3a5, 0x38, 0x33a, 0x3, 0x9862, 0x20, 0x2, 0x1, 0x8, 0x9}, [{0x0, 0x1, 0xff, 0x5, 0x7fffffff, 0xffff, 0x4, 0x3}, {0x7, 0x73a658d6, 0x100000001, 0x848f, 0x5, 0xbc0, 0x6b39efbe, 0x1000}], "d1d3c3316a11a0cb262893741f3ccfc0c881670bae3e8fce51fbb9f06ffa25c55be3c60d8c4d64d95579b1c22bf47accd012b1fc43dd7dba88f30e4d879ccddd0ece30b54d063a6784ed8d058038e08f903343874cb623eaa5926d94738bb6b0ff3abe9b88eee8e351d95c2aeadc9a8bd082d3b967855a746af5ae147f6c5b9378f01c3adb32fd58197bc000fad55c9159adc1f95bda3e34c3739205ee36a5942b2c94eeda7ba9b65a34e4ef78c4a54e3d19b2c6863d40c312ce15f961f10c81dfaa2a1bd4429a5ac32be46c5e5e2026ecc785d3dab20c2a6143b5696731eeb84fdd8ad27db331edab76822b9d0bf23b2c7713d839c361c7caf0e7fa8d465899a95d98141a92baa3f3fc2abe931a54a4e6cffc6bfa89623e5a58cbd2ea5d40113cab0eec07c21d7a1550ab54688bf40b4e32dc6211510c5d2b0b03997a7be10d16ea5fd45c83bc11c663b39618a76bf0b70ff8d1d475d99abcfc85d77f5e6fa993d56e6bb1fa6e03d1ee44464a362f6833d8dc4e4e1591d2f4606e1a8957610da110aeb0ef600340facd255232b8ed5bac389fc5dcb03f82996481cc5897254a4c8a6199876e011d7ef9a31d0e07e5f9252f7b76f290fdac0a1f6b627e6357921669b71d4b12a53c8394a7af3051d9a0aa0f38d77963bd63463cbd948b4b896bb0a11e3b427e6fa8587524b85c53023637ae3b0ff074f351bcc17aa6a10775150445d8a317df60ece20e2b4b41c2cad39317329126e0ec4e8e24a717e9b85670699180980c850e2c00151cf5a7c3298513d9ffc390825a5e85f52911beb7508f83c4781a63854b9d20395670aec7e78e64ab1154b0b037359b5eafcb28465b3cc47a4063e37440ffc25070a4144e1f372bfbe11da940c9bffe8adfb34070fb8b4cfae5699cb3efe74ca622990f0323311f520cf18d6c1b8c34091aacef0096fc29ddeeeccc1717c46f276a01043826b57e8f12ad4fab59a7afeb8e17a8c4b7e433e3ca0465da744e866749553e18ef2815ea221fa2a687103132a9261c8be45190c749140977bbd6df073db869e8dce319719a791681b2331beb7a13ef02e72e63cc9c158b992b4e86a1b1f26a4755b32fb60b5ee158a373bbf7088d3c4e43aa7dbd3206d4c03aaf7a7290057509de4337ee655a4a19af6f6fb67f8326957b79629dac7c76c26f05d50721c61db0f27c06969cb1ddc54c168d0834e4b6076190ebfdbf2be76b532a32c61c42e57ceb410cc0e63bec46b39b588e235b0155605be339e7e9dfc7bbde10a9df473e357c49bd295cf7bba8101af24f3f9c15f111391b7e276975497de1efe7a032545af04d0b22aec261a6b1d4c0f5ffe96073e1ba8becfac3a8beae2a96f432d84dd82debbd10321819f7ad69aff482d3ada0259039c39a117fa6e681dd5684dbdf0ae7918a308c26c549f9553b60d3954f8e32286d7a0b21e8189f312cbf08881ad4fb0c5dde428ea68846366df1032f56c1da6c1ce6d357718795270762a738de15eeeebab694ac69912380ec37061b50ff758fe4552aa8d8bac108e4946fdcd629ccb3279ead9cf169132cc74fadc2cd93c6f7c1df3ab4913eb22e24b85376a680daf4a71d8fe60bd3bae14ed9dd05fa3cec54d38c59f2c0fb72b4b17483ca1e2bdb7435e2fd786b3a2640d439bb9dff8fc4ff0d3643bf7c0645315448bfee64fc7f76e52dd3d719ac7e19409fb2c879af97b4c84c859237a2a57425309913387fab0cb56d09a404717dadb575a7734849637ae5a279cecb09def90fd18d92d7d1d145e345b5287e9b321a8bf80374dc7506116e781d593ddd0d697ca561d8cd7544b0b87f285acc41bf4f1cbbd6b14dd1b92fef27e2a8691ad7cc9db647424745eaf0563f0676fdf897c659b189c4c4c3677fb503cb9e232568028729f070032de28e007fcf412a8beedcf35fa75edebe572f7fc3b439361cb79acd7841170a2346f6adcd3e1b0d34b16d262d4690c4e92b58b1d92363a646833454dfde530fd97f234338e7a40b706ae26a30f8a9609aa43d12e25f733adb3ffb48f5ffd94ef20bca96aae72085c91cd33a882c75f5c58c6b73a458ba426cd6b0df5ce1984464f1a375ae8772d8eb3efe02488c9b6998da8e469d56e96bc0508e5794bce6a8c59321a3419a3476dc24d1484e6ea284e80bedc40aae2a71fb7c22022b2b58cecdc311331d3b7effefb2cd5f7b8fc24baf30cf9db243d1197b6c55434f93248a7abc773f2240fca0178386c1208af5e26cd623b4f151861de47a751ddd8d68ceab55f1af422a90e71d7aa3635bbf3ffe35564f090ba0b759c9bc1b9bfce7c133d9cab40ec2525ac17c53258cd1a798d9e48f63dd8124afa2a25bb9d0cd6524a6b2d8e50f46858df5cac7706c5afa2f53846863796ee1c05ecc784f76da0ccfd22c4dcbdcbf7e51dd4e07064bf5b8cd6c15e9cdaad05f785f37f8418c8dfed2f6d0b93488028b648efd4e2589bd62dcd431b9c430cfa0486d4a9fef738512abc7440c0f714415c123920024c71332bc756cc5a157e601163bbc0d781a083cd29f045ff01a97e2c8d6f014bdc1b5f4a40866828b5eb9af7221a563d7fef88fc741f6bce53ca6564742972821caebc2dc6dedf5a219b9f00c057f1092584eb361c6b4b2ba696919cf214fff056e215169ddd5bdc46acc9b676df487f649c4338cb543e60ecf32666df91818d9d672ad3593ec08badcf16abb749949f1dbd413eeddc4d4e6a3e3f822a83a69b46a59912ae80d318de8dae4a9b25dcc4f9a5ccbfe5d351369e248af0b4b4ca96bae1d38ea8d2a5ccc8f90f8b56e95e8d47f8d0dc2f1b30b969ae8eb6dac10a41e6ed21ec2bc21296a0eac6631aa1231a204681172b65355fcfd1873acb8d82c0a1f6b2f72456b821ef2d0b7509c638e4919c7ec81ae81375c4b3f0786df578f4701477d32982c6fd29573522535ada0f41aa34d3909f90af739e52c875d5fa3661f8a94f8601c8503829390c207932580b687d26ba1000f98e3b3ee67e8295059e1c7f1374ad1a176c418938acb9e72013199792036a1e7f1e1a54b9b571fc1e672d8877f3be51383c112037fe9656e5c28699638b04f6348dc1cee0bd2f8200a1166c9f65bb4e889d7f469150622af8692f7c160d53dffe1d0136accc62d012faa599cca34b3851d75830008d40768456796df6cc457de6b8fe1eaba32c1ba75a62625e7a78117e817bf988d0f08c974ebd4f6c475940638b193395bfb71829efdff9864f71eb7ce6bded8d1793027a3e42c3a029f93375ede7022959ea36ad93fd2955996974ee12cabb866bdd7991bd5ff1a74035160f8d420d7e12283d32ab17c80226ac3be3ac6da2d9ad1fd4f17eb32355b3c6c2cf6479854b35508b7ec93e84348d867a1667fe4ca2924f6a26a621e9a913ba9c2bc0ea7e06a7adf5b33b7263e8186b82c45aa91186d40baf7c0de019fc876f8cb502a175a461612873947eb460425a5f17d01cd28f48ae38b7959c5c790aa0e6e51f2f0c48a6405281ea7e4619f3592026aae6c7ad8c04d244af4dee5510d1ac2554fdbf1f921ede03eb715cb7258cd11bb5df99d5f547bb29649b91503ab7c68bbcc10e140c878bc33ce7dfedfd2a722ef12953decb9c8c01cfac8fef59a0b889a171ae9231e229bd6c01d16c72cfc60c7eed726902b8778e9674c94860da22ee8ca1818657662f607eef4c2d6952cbc6ea43b5182f35326d893c3ef3676bfbfbc533a87e672fe086f821ba57bc7be8b1ec7ffe8f116e351d0b3806af1c90fc3eda6866baa81b33ea3b2e05132bdab7b572f61cc15181bd475d7045f477b90b0662ad71876cde420174a73fa00e4fbfb4ee3bada61d93c923dc01a56e805343dd531f034111eda3d6c404afd11624c84336a867b8f28d6075ab7200497401c83e30ff907d2f8823396237c5d2137209d8367535bdb5f8f4a09a84e4d7bc2bc15eed84b0570587586c4fc13af71b793053faf3525e76277ff4e2b90ddd41cd289f3027c610419bbf86b76979232a91f28fd1e1723be2b8667036ca089db1f0b68efa8d9925851e6fc1e108c333c08258b46a862a6286d40d7e2dbe5b8386b9c646d02de964df476f123d72c27e7552d8e2a9a2b0b001699a1ed9bbd1d450fff1d6a8fe994879580bd90a248d9018917f1f0995eed28811acf14a3cc5454841da350770742ee99eb4685f25726c90a39cb77415871ea731cfb0c4980cf366d11f242e6376d30699028252603622e4fa79bbcbafc1a5807c0459f8bdbdb39bb240893da4bf1f66f840abe80f5a28b506d612e742866478cef421297c344d4190270c79bc19972ede6c891f4ee537320b43a17bb00408f54e3eedf89c4a3597f25e5f73074c089ed8b96a6328c2f13671e3c375f7d5522513d06ed495be9a04c6b7577d9101144ab0bc51f183812e2a830c6c5e94639e7d4037c46d8268fdfb870e0575689a26ea12973a55fdac48bdf8e8c76033fca5016b592ececd522c1f2ddc8a645844f2a23b26f620ab28549416fc60b41b579c00e0e6a24dd37cfe7a3b800bb08b2c4648a7722be0865a3ea80408b488bc9893542bfc4da48e18e9c89caf51eb1c83fe3e97b8b7e28effc96f5f82fb941cf298413bb61dca591f52b3e1295424325a69b0c4563f77fdc0d99e4367b37f4a761091243f9e2c3df3d1d1b00d38c058d9e342bad078d8691c329d015505481752373ae7f2489ab4bd758a85e896c07f0125e6a91502f2a86d606a504594f7eab04e960f4e54dc73724702fea024c30664f4da485d32969a77d20c1eaeedccb35eb70d4f5146d6d66b4d49fbd1f9e11eeb6915c5ac7795988974673bdaf908d7b7104e6a0789f353daee15d68818ef36543e40c0e2008837f08cbe11adbe7bd68427bb18ab5dc02948da454aa5f6fe5d40ecaa60a2c7ab11173d70c2efea81dafda31a4615afea3c19e0f86e5ae8e2722177eab33e39c0770c8e3ca17f5904abdc8557d8a69263b45340b951263bea2d656be05d14b04247f927f432f032ea0314e27b6dc5907c4d43191b68887f33f3695faf558c9eb39eaa84857e77714e57778125027ba510e55c8303ac257378befa58d04d7a44b8d0e7a2600441b44682149191eaf31db0a06bf912aae97339a6fa2736d6bb3654369c274de9119777497aedc3de7986bedae7c972231b2899e65a8d8579d87095cc1d9d589d9d4db9f517d0b744b39503efde1176c58b5e0044d055e907c46ab2b655015009aa0e10c4887952112fc6a646c1f54375692b4f8cfacee8677aacd15147735d51b6f49b51ebbe2ce235105a040f02b47ec865532bf1d7c5b1807b9d8674c7e9d125bb1cef2732d333e20cf722932bac093bd3a149ae8eb07edec73d8c18f767b5c1ea5741c9665cc6ff6293cf467353744ea0be16495d99fd99a626c67beb2d242d112bcc96cd7bab93312cdc88731134d0629dd245a618edca5e2400bebbe296a7c9806b574b94866b34adc8339b83996865f6a0ebd565f82a7b1b8189fa3c7a6e68cdbfc79b4b7664d76458087de74b21e1f0513cbda8a44751efdb0d74cac738534ffc2d856577b263354341a82331345dccbb1afe89cc57b64d71403871bc5a8338c0836655275ca0ee24fd6800002e6d0485c962c1bf53b6512e28de03f26335de9e33f81e49be41834c9e916f2f4b981376caf183d959daa8d388764e9f77c13d0a3c4041cd4b73cf78748aae71fa14f1611d67f3c5347a44e7af513d59b7b7ba357159976bccaee086665e420dbcc037982e73c70f9eaa73ab0cb736436ed08", [[], [], [], [], []]}, 0x1578) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001700)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xe8) r4 = getgid() write$FUSE_CREATE_OPEN(r2, &(0x7f0000001800)={0xa0, 0x0, 0x5, {{0x5, 0x1, 0x3, 0x559, 0x0, 0x80000001, {0x6, 0x0, 0xff8, 0xffffffff, 0x3, 0x100, 0x5, 0x9, 0x4111, 0xdbe, 0x1, r3, r4, 0x1, 0x3}}, {0x0, 0x1}}}, 0xa0) write$cgroup_pid(r2, &(0x7f0000000080)=r0, 0x12) 04:34:06 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:06 executing program 2: r0 = socket(0x10, 0x2, 0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000180)=""/124, &(0x7f0000000200)=0x7c) ioprio_get$uid(0x3, r1) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305030008000100010423dcffdf00", 0x1f) socket(0x3, 0x8000a, 0x101) close(r0) 04:34:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_mreq(r1, 0x0, 0x27, &(0x7f0000000040)={@broadcast, @loopback}, &(0x7f0000000080)=0x8) write$cgroup_int(r1, &(0x7f0000000000)=0x7fffffff, 0x12) ioctl$sock_ifreq(r0, 0x89b7, &(0x7f0000000240)={'eql\x00', @ifru_addrs=@hci={0x1f, 0x0, 0x3}}) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000280)=r2) prctl$PR_GET_KEEPCAPS(0x7) writev(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010007081000414900000004fcff", 0x58}], 0x1) 04:34:06 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:06 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYBLOB="02005f6b150a76043629b9000000000000a14aedbc46d32677ff46d86df5aa4da1ebd111913c58409e4e39992ef92f"], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="bee758948b6615e5"]) prctl$PR_SET_DUMPABLE(0x4, 0x5) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000280)='system_u:object_r:devpts_t:s0\x00', 0x1e, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:06 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:06 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:34:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x420000, 0x90) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000180)={0x80000000}) prctl$PR_MCE_KILL_GET(0x22) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000011c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000560000000800000300000000000000deff000000000000000000000000000000000000000000006be50743f200000000000000000000000000000400000000"], 0x58) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x3, {{0xa, 0x4e22, 0x200, @empty, 0xe95}}, {{0xa, 0x4e22, 0x9, @remote, 0x1f}}}, 0x108) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x401, 0x4, 0x7, 0x15, "8a973b54ca4b71623279c99d4c2a58480a2ecac3edcd9ed08e9e4e0e539dc43a568ad12a37f539bfa8ed958e2fb9115ceed14ea24bfc6b8bc36f8fc50bddfe5b", "54c6097fab37ee1a7033f94248b1c1263dce9ed0bb425ac825076083e64aff68", [0x1000, 0x3f]}) 04:34:06 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:06 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0xf9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000012c0)={{{@in6=@ipv4={[], [], @empty}, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000240)=0xe8) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, 0x0) r0 = socket(0xe, 0x2, 0x6210) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80040084}, 0xc, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="20002abd7000fedbdf25070000004c000200080002004e24000008000500f60000000800040001000000080003000300000008000800ff010000080002004e240000080008002b000000080004000200000008000300000000002a2162902752e46d676d05ac42c4d505778fc04d9abea4c198f49853b907d38adfafe0ee648b66904368a957a97d1a023b357c2da43f764aab471ea2766ab91163095655397c51a413818e3dc22bcc1511374e24960e4fdedc83656318a174190b8bbec60ca9d086c87225754d10da259f940afb693affa7b352b4c1b2e8e548b4daf424df89b3209761f926b09514c32eb00a2fb479d27edbc4ecbbad4af42155bfae7630152ef7c6a475d9b94030da854a02c5e2568ca5f9820b61438dc4b09e61080812dbb9ea239e9aee509afd3f8e83c0d0c63e8ffb24311dfecd"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x24040804) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, 0x1, 0x0, [{{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @ipv4}}, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}]}, 0x440e) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x10000000000, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) connect$inet(r1, &(0x7f0000000280)={0x2, 0xfffffffffffffffc, @local}, 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0xfffffffffffffffe, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x4e22, @remote}, {0x2, 0x4e20, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x1000, 0x800000000, 0xffffffffffffffff}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x33) rename(&(0x7f0000002300)='./file0\x00', &(0x7f0000000580)='./file0\x00') sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000048c0)={{{@in6=@remote, @in6=@ipv4={[], [], @remote}}}, {{@in6=@remote}}}, &(0x7f00000049c0)=0xe8) unshare(0x60000000) 04:34:06 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:34:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x3, &(0x7f0000000080)={0x7, &(0x7f0000000000)=[{0x1, 0x1, 0x8, 0x7fd7}, {0x5, 0x8, 0x1000, 0x9}, {0x9, 0x3ff, 0x1, 0x784e}, {0xf2000000000000, 0x7, 0xfffffffffffffe00, 0x3f}, {0xfb, 0x4, 0x100, 0x3}, {0x4, 0x0, 0x2, 0xffffffff}, {0x7, 0x2, 0xebda, 0x10000}]}) io_setup(0x20, &(0x7f0000000040)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000980)) ioctl$TUNSETLINK(r0, 0x400454cd, 0x3) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000800)={&(0x7f00000001c0)={0x48, r3, 0x0, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xf7bd}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x4040) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000340)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000005c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000002c0)='./file1\x00', 0x3, 0x1, &(0x7f0000000300)=[{&(0x7f0000000680)="6bb1abf230c3474fad8cd7127723d26d34ccef6efe166aab1f817656b53a4cedce191c9995593e6b6170fbdcd8eabe26e722ad230f752363bd89131bb2f0ec3a125c727169aca82cc9fed30695e76841418faa1ae6c833ab67b4bcaa6ee0fd330de71060ad9c2ae41830e816eaa719019541234a93f3fc8ac01e6ee19ee67b31f26cd4e068c00212fb96180f878abbae0600251ec5fe749278a35f916ded4289313fe46da172aa2431e43f24eec907b28f80d2bd8b39bacd3eca0bbaddba67ad18927c8a5b5cd7fc598e51bef1d978273492afaf3a392bde57b74f9d64728fc8fd040c05caa7b094b66c453d685c38", 0xef, 0xfbb3}], 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x20008005, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0xed}}, 0x0) exit(0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f00000002c0)=ANY=[]}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) recvmsg(r4, &(0x7f0000000100)={0x0, 0x360, 0x0, 0x9f, 0x0, 0x21f}, 0x0) 04:34:06 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) 04:34:07 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) 04:34:07 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) 04:34:07 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x20000) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000040)="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") perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 04:34:07 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0) 04:34:07 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:34:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100"/177], 0x1) request_key(0x0, &(0x7f0000000940)={'syz', 0x1}, &(0x7f0000000980)='bridge_slave_1\x00', 0xfffffffffffffffb) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) 04:34:07 executing program 2: 04:34:07 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="02000000000000000000800000000000"], 0x10}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) fcntl$dupfd(r2, 0x406, r0) pipe2(&(0x7f0000000280), 0x80000) openat$cgroup_ro(r0, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x40602, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vga_arbiter\x00', 0x80400, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f00000003c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x6) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r1, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) sendto$inet(r5, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:07 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:07 executing program 2: 04:34:07 executing program 0: 04:34:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_targets\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/icmp6\x00') sendfile(r0, r1, 0x0, 0x8) 04:34:07 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="009000000000000000004c00000000000000000000000000e0e51532000000000200880126001000000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) 04:34:07 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$sock_SIOCBRDELBR(r0, 0x4004743c, 0x0) 04:34:07 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0) 04:34:07 executing program 0: 04:34:08 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:34:08 executing program 2: 04:34:08 executing program 0: 04:34:08 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="000000209b000000000000000037e1a166f7853ba157756debdfc610b09a095d5a17def72d6d85bc5099c99684012a7aee978573203134ceb37322"], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(r1, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:08 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0) 04:34:08 executing program 2: 04:34:08 executing program 0: 04:34:08 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:34:08 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:08 executing program 0: 04:34:08 executing program 2: clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_procfs(r0, 0x0) tkill(r0, 0xf) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f119bd070") ptrace(0x4206, r0) wait4(0x0, 0x0, 0x0, 0x0) 04:34:08 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf215, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 04:34:08 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x10) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./bus\x00', 0x6, 0x3) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x8000000004e20, 0x6bf}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x31, &(0x7f0000000140)=0x4, 0x4) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0x3c, 0x0, 0x812, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x4}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}]}, 0x3c}}, 0x0) 04:34:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001140)="0adc03263c343f319bd070") ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000200)={r0}) 04:34:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x2}) [ 451.099196] audit_printk_skb: 81 callbacks suppressed [ 451.099207] audit: type=1400 audit(1556166848.738:157): avc: denied { read } for pid=24406 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 451.143457] audit: type=1400 audit(1556166848.778:158): avc: denied { prog_load } for pid=24406 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 451.573023] audit: type=1400 audit(1556166849.208:159): avc: denied { create } for pid=24397 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 451.610896] audit: type=1400 audit(1556166849.248:160): avc: denied { write } for pid=24397 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:34:09 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:09 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) 04:34:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="2400000002031f001cfffd946fa2830020200a800900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 04:34:09 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:34:09 executing program 5: mknod(&(0x7f0000000280)='./bus\x00', 0x100e, 0x0) open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x2000, 0x0) 04:34:09 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 451.901932] audit: type=1400 audit(1556166849.538:161): avc: denied { create } for pid=24448 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 04:34:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) 04:34:09 executing program 2: mknod(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ioctl$void(r0, 0xc0045878) 04:34:09 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) [ 451.955791] audit: type=1400 audit(1556166849.588:162): avc: denied { write } for pid=24448 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 04:34:09 executing program 2: mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x10) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./bus\x00', 0x6, 0x3) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x8000000004e20, 0x6bf}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x31, &(0x7f0000000140)=0x4, 0x4) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000480)={0x3c, 0x0, 0x812, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x4}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}]}, 0x3c}}, 0x0) [ 451.955851] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 04:34:09 executing program 2: r0 = socket$inet6(0xa, 0x4000000000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000440)=@in={0x2, 0x4e24, @multicast2}, 0x80, 0x0}}], 0x1, 0x0) [ 452.003621] audit: type=1400 audit(1556166849.638:163): avc: denied { create } for pid=24461 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 452.023029] audit: type=1400 audit(1556166849.638:164): avc: denied { write } for pid=24461 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:34:09 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) [ 452.059112] audit: type=1400 audit(1556166849.668:166): avc: denied { read } for pid=24461 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 452.076006] audit: type=1400 audit(1556166849.648:165): avc: denied { prog_load } for pid=24452 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 452.548553] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 04:34:10 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) syz_open_procfs$namespace(r1, &(0x7f0000000240)='ns/cgroup\x00') ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x1, 0x1030, r0, 0x7fffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x8) r5 = dup3(r4, r4, 0x80000) recvfrom$inet(r5, &(0x7f0000000100)=""/162, 0xa2, 0x1, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000200)) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r7 = getegid() ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) ioctl$TUNSETGROUP(r3, 0x400454ce, r7) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) ioctl$BLKTRACESTOP(r6, 0x1275, 0x0) 04:34:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001d00)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x1000000003, 0x1) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) 04:34:10 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:34:10 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz'}, 0x0, 0xfffffffffffffffb) 04:34:10 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="01e200ea0bffffffff2b000000000000"], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x6) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000003c0)=ANY=[@ANYBLOB="0cb8a2e8773ad8bea61e996e810608f6673fb1eadc6f9c5bd2089bc3edcd421fb671c660d50d01a41d0ccf492dc8e97b00933aefc18b1bf068180ad7dae2f40457d967a2db1a8c7d3455aa440dcbb22c29e5e5fa857aa399641965e7fce60913a368b20206e95d3e0ecd96ca22f02cfa40ee24177ef6cc465b2f995345deecce449b"]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r1, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKRRPART(r4, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r5 = openat$cgroup_ro(r3, &(0x7f0000000540)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYRES16=r1, @ANYRES64=r1, @ANYRESDEC=r0], 0x1e) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r3, 0x540d) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) sendto$inet(r5, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:10 executing program 2: mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x10) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./bus\x00', 0x6, 0x3) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x8000000004e20, 0x6bf}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x31, &(0x7f0000000140)=0x4, 0x4) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000440)=@fragment, 0x8) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8040fffffffd) 04:34:10 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:34:10 executing program 5: r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000300), 0x1c) sendmmsg(r0, &(0x7f0000009ac0)=[{{&(0x7f0000000280)=@ethernet={0x0, @random="cf13c82f5843"}, 0x80, 0x0}}], 0x1, 0x4) 04:34:10 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 04:34:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="11dca5055e0bcfec7be070") connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x8, 0x1, 0x1, 0x4, 0x80000001, 0x6}, 0x20) 04:34:11 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:34:11 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./U\t\xb4d\x13A\xdaO&\xaf\xb20\xebmh,\xbf\xbb', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r2, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20d907000000000000ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:11 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:11 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$system_posix_acl(r0, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000940)=ANY=[@ANYBLOB], 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000100)='./file1\x00', 0x0) 04:34:11 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:11 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:34:11 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_ifreq(r0, 0x1000089e1, &(0x7f0000000280)={'eql\x00\xff\x00\x00\x00\x00\x00\x00\xf7\xe0\x847\x00', @ifru_names='eql\x00'}) 04:34:11 executing program 0: mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x10) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./bus\x00', 0x6, 0x3) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x8000000004e20, 0x6bf}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x31, &(0x7f0000000140)=0x4, 0x4) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f0000000240)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x81}, 0x4) 04:34:11 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:11 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:34:11 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x40) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:34:11 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:34:11 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:34:12 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:34:12 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:12 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) 04:34:12 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000007000)={@broadcast, @random="cf2bb43c40b8", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x32, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x3, 0x5}}}}}}, 0x0) 04:34:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000040)=@get={0x1, &(0x7f0000000000)=""/63, 0x5}) 04:34:12 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 04:34:12 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) [ 454.947568] FAT-fs (loop3): bogus number of reserved sectors [ 454.958703] FAT-fs (loop3): Can't find a valid FAT filesystem [ 455.127490] FAT-fs (loop3): bogus number of reserved sectors [ 455.134611] FAT-fs (loop3): Can't find a valid FAT filesystem 04:34:14 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:14 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x3}, 0x74) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="2121ed68cca4fd3a19da0a"], 0xb) 04:34:14 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:34:14 executing program 0: mknod(&(0x7f0000000280)='./bus\x00', 0x100e, 0x0) r0 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0xffffffffffffffff) 04:34:14 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff}) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x4) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x6) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r1, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r3, 0x540d) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) sendto$inet(r4, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:14 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:14 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(r1, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r1, 0x540d) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:14 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:34:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x26e1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0xe2e4, 0x20000ffd}) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYPTR], 0x8) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl$FS_IOC_FSSETXATTR(r1, 0xc020660b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x980000}) 04:34:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f0000000180)="1f00000055000d0000000000fc07ff1b070404000d00000007000100010039", 0x1f) 04:34:14 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:34:14 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x5) 04:34:17 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:17 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000001c0)='./file0\x00', 0x8408, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000040)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) exit_group(0x0) 04:34:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x80001, 0x84) r2 = dup3(r1, r0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x4008015) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 04:34:17 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) 04:34:17 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYRES64], 0x8}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(r1, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:17 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:17 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) 04:34:17 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) 04:34:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) connect(r0, 0x0, 0x0) 04:34:17 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f00006fc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) 04:34:17 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135"], 0x33) 04:34:17 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 460.312967] audit_printk_skb: 87 callbacks suppressed [ 460.312979] audit: type=1400 audit(1556166857.948:196): avc: denied { create } for pid=24718 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 460.335802] audit: type=1400 audit(1556166857.968:197): avc: denied { write } for pid=24718 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 460.371395] audit: type=1400 audit(1556166858.008:198): avc: denied { read } for pid=24718 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 460.373366] audit: type=1400 audit(1556166858.008:199): avc: denied { prog_load } for pid=24718 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 04:34:20 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:20 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:20 executing program 0: clone(0x202, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) 04:34:20 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:34:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000498000)={0x0, 0x0, &(0x7f0000c8d000)={&(0x7f00000001c0)={0x14, 0x1, 0x2, 0x40000800000001}, 0x14}}, 0x0) 04:34:20 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000003c0)=ANY=[@ANYBLOB="76a5cc0c40402552ca605e25d6cdaa5a40a0b49a9a68d41f19c78bf2f292b639df463f71c883a8bbf63a5c076bbb552897ba6c551a91989d0d24d4a4a9e4d5f0670cbf3de8e280d5fd1207349ea17bef"]) prctl$PR_SET_DUMPABLE(0x4, 0x2) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='.\x00') fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) [ 463.040969] audit: type=1400 audit(1556166860.678:200): avc: denied { create } for pid=24783 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 04:34:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x810) 04:34:20 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[], 0x0) [ 463.091840] audit: type=1400 audit(1556166860.728:201): avc: denied { create } for pid=24785 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 463.095429] audit: type=1400 audit(1556166860.728:202): avc: denied { write } for pid=24785 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:34:20 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[], 0x0) [ 463.111125] audit: type=1400 audit(1556166860.748:203): avc: denied { read } for pid=24788 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:34:21 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[], 0x0) 04:34:21 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x4, 0x0) [ 463.210945] audit: type=1400 audit(1556166860.808:204): avc: denied { prog_load } for pid=24785 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 04:34:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = timerfd_create(0x8, 0x0) close(r1) [ 463.516603] audit: type=1400 audit(1556166861.148:205): avc: denied { create } for pid=24783 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 04:34:23 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:23 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000026c0)={[{@fat=@fmask={'fmask'}}]}) 04:34:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100"/177], 0x1) 04:34:23 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60a1bba904d92c00fe8000000000000000000000000000aafe8000000000000000000000000000aa0620880b0000000000000800000086ddb6f0ef4500a60198e130fe116116e2fce6bd265587502aac867a549810fd11c95b42c45253f19bed90ed8890d37a7b06ed9a9c16c145dd80ac0b8ce400ceb6208c1a003f6ebfaa152c5207724db406f865ffe5f962641804bf03cec6fd3d8892b9c27e26af0b39113653be0d0c120f354ae4854c222bf468be2e9c5686407173ba634a17312da90b447dbd537d9985c80f5343529dcd83c8edfc97b3a42ad0bc067cfcd44398f634db4145452798a4b4d1069b3f05d46b66fcecdb9c95ca00e5c388670545260a245f658fddbfc8ff8c9068434e9f67af644a2a426afdbeef1eb5f9fea6805e6bd3d01210a887521c651baed37b4b7c0221c3560cc12d37f15a46ed57875da4362dec873f667a42677bbf29706f8e5649aa7eba7e9064b80e3d473ad497799a828e3577dee72b47d96df682c857ba521b3684f726340d5b66e72db64e0c26d8df27911023f2bd4126ebef88e29dd27099ee8b01aea451429079ce4ff3fb790cfff1f22940371b83075e0fb86b6c70abb9a6674f0f9c2c864ff9d48b33548ef85157cecc14eaf4dc372f86fb1716664c85ab222643d4ad0707a023a25cb285d365f02976291710cc9d3cd4e15fa6d5aee8055252409d248d44ddb0f6a8662f05877ac3bcf7c2cbe78f0aaa68289664fa22181688af4b93e38b7cfe497bbbc682c22a4c4a23ec7d0e07e9692db3e53833f96ae9daca4c968d6e8bce24247e34f5f28fb54fcb540968c195fb3fd6d627d0da2803720d8ab591fabd646c0f2d09e72a077b7e840b8b01f6aa47bf27712e6262188d8b9ded9a59701c4808bb8b9f1bc44a664d7706af19d26c38241aad01a91caa8e9a00bd534c55dcdbdecde344d3097a1e891310ba333e7636f4a47a4ba4b9866c46c150352d4c62a1b40bbe5e0c994b94efe0e317a78d3d9371a1f49a6b79fd635ab015b8aafcc44a863a85d51061b2fd2a989188b3006ca0099bbf179ed725f4f83d2755985e56fe53070eb10ec01f5810604daf33c38ec13543ca92246d45a960137e023d5a496ef5805ac40d056796d4db2de519ab9acf429c19884a4aaf26e4fdc8174dcb0e666601f67d2f67d5ac2e1ff2e53b41409169642a539f5cee7b91ec611e0a4d841d62451bfd31f4398d934fcc53b41e8a26a7baae95b94c7432bde881c97b1faba44665c2cf9935332a9e33253fb6be8bca1c840607a23c87a1730fa53da174185990ac775237d60932cd007b00bac814084b4e5c398d7e87349d1977c8c87186b10b8b1d15ce32eefd4a2ded980e9b43e5692bc61179431e41ba23ee3f7e8ebaf4e27dc7cc79930a0d864d6e56df96eb4d2c240df66effecb3accee9d319080088be000000001000000001000000000000ea080022eb000000002000000002000000000000000000000008006558000000002e7c1df3f2f4acbb4ace6e8a50565b595591e78d9b12245a598496ea23d4c406af9f3b4a3f009159f9ac1555e4477ff94d4d50913843082ace4419eb0e79f826c9d383e2310e60b0b49f7a2d305f00945c1f774a8da5fb8f04988ee9e082d4f9070955ff1bbd44d6fdb144e01f9f2e5ee65ccc71338ca0a50652cb6b5ae30e0fce110b555945fa43cebd22a399d6a33dea3af82460a33f5a491976018b1b56dd512d481061c6bb980d69bccee5352b18539b08b6ac9e0116f524316e8c9c036ecc709398af6f67e8cd867f37c25ce2cc300f9b13e48dbe59b049ecc4a4878fe86ce1a53faf698b9d0ce14636ec6fa8f086a4a75a35507d8d8196e3a12734183d4b96b1c47b571bd784badc3a469a252a3e472a9663a7f7abdc13a9746aaccbf5a8882994f63f3e8ff8b33cc4ae1eba08143b87f5e013918837b42f8122c290d55b8a825172352226564d4d24ea123d899d5e4b2809fa714739aea0aefd421da08ef3b94234a361896215f4aabe5a61008a81739b0dee3ed9feb025b7763c9c744702ebf266e3caae52aafebe219c0025944631d6b1c622b3004a1be7458a00b4887aadc0f8bfbb0222ce4f325b5768635fda3a5c20314aaa9bfa7a201e668f112a6cf501b85c30fece209e2620014a9d1dab8f11f982ccdd226e36b1bc4c92c2c4164f020499b6021947c3985132e376d13002bf229d88af"], 0x0) 04:34:23 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)=0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000200021d8568021baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x6) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r5, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000780)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYRES64=r2, @ANYPTR64, @ANYRES64=r0]], @ANYBLOB="f465cc703952df33058f50f179164fbfd558bd386ae655ea6c65d26629acc622052bb5084e7533a682541443851323eb30c86dd019ce0a77ef1ae019f1c9d62af69b0b7846f7be1c22f7adba2a8c08e3f93feda0267c68a8e4e894d0a4b2c0bb20e7b39506f96f9a63e93a505939cbff8b91129c9c55a964fdc6b4201d47db104f7103b6f85b8c6a0257cb295b", @ANYRESHEX=0x0, @ANYPTR]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r1, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(r5, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x20032600) 04:34:23 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) shutdown(r0, 0x0) 04:34:23 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp6\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 04:34:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000180)='^posix_acl_accessp\x04p1vk\xee\x05\xdaY\xd4\x8d\x13\x06\xce\\\x89\x18R\xa9{\x05#\a\xf6$\x0fcR\xc8\x15\a\x92]kL\xf5\x1f\x8b\xb9`0d1\x1aA\xc9\x16\n4:\x12\xf1\x82Z/\x02\xb0\x92w\xdd\xbfm\x1e\x12Gh\xbd\x8a\xcej\x19\n\x81\x86\xc9\xdb\xa3G\xa9\xa1W', 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffcde) splice(r1, 0x0, r2, 0x0, 0x1000000007ff, 0x0) 04:34:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="5500000018007f1412fe01b2a4a280930a06000000a84306910500000b000f0035020000060000001900154004000001d40000dc1338d54400009b84136ef75afb83de44110016000d0004000000060cec4faba7d4", 0x55}], 0x1}, 0x0) 04:34:23 executing program 2: 04:34:23 executing program 2: 04:34:26 executing program 0: r0 = socket$inet6(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206000000a84309c026234d0400080015000900110000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb6cde448daa7227c43ab8620000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) 04:34:26 executing program 2: mlockall(0x2) mmap(&(0x7f000071c000/0x400000)=nil, 0x400000, 0x3, 0x5012, 0xffffffffffffffff, 0x0) 04:34:26 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:26 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x168, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:26 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1800008912, &(0x7f00000001c0)="1098ce66000000007be070") mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r1, r2, 0x0, 0x1) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) 04:34:26 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="020f00001000000000000000000000000800120000000100007ab0000000000046000057000000000000000007593bcf2102fd510040000008250000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd3b8200000000000c7"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 04:34:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@flushpolicy={0x18, 0x1d, 0x7, 0x0, 0x0, "", [@tfcpad={0x8, 0x16, 0x8000}]}, 0x18}}, 0x0) 04:34:26 executing program 2: 04:34:26 executing program 2: 04:34:26 executing program 2: 04:34:26 executing program 0: 04:34:26 executing program 0: 04:34:26 executing program 2: 04:34:27 executing program 2: 04:34:29 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:29 executing program 0: 04:34:29 executing program 4: 04:34:29 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x6) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r1, 0x540d) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) sendto$inet(r2, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:29 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000340)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000003c0)=ANY=[@ANYBLOB="3635000000000000000000000000ba06d999ae2676fbf9302c60566937dd00"]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xfffffffffffffe99) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:29 executing program 2: 04:34:29 executing program 2: 04:34:29 executing program 0: 04:34:29 executing program 4: 04:34:29 executing program 0: 04:34:29 executing program 2: 04:34:29 executing program 4: 04:34:32 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:32 executing program 2: 04:34:32 executing program 0: 04:34:32 executing program 4: 04:34:32 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x6) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r1, 0x540d) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) sendto$inet(r2, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:32 executing program 3: r0 = accept(0xffffffffffffff9c, &(0x7f0000003340)=@in6={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000033c0)=0x80) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x4000050) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x6) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000003c0)=ANY=[@ANYBLOB="56c52ed22927eb189b87f38c1c0c65939d308ebce8eccb02deb653957d8cd719ce51832528343a6f61a7becbe1a34371bb14c99969fd307c54d47fd664ab000094"]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r1, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r3, 0x540d) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) sendto$inet(r4, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:32 executing program 4: 04:34:32 executing program 0: 04:34:32 executing program 2: 04:34:32 executing program 2: 04:34:32 executing program 0: 04:34:32 executing program 4: 04:34:35 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:35 executing program 2: 04:34:35 executing program 0: 04:34:35 executing program 4: 04:34:35 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0e0000008f000000"], 0x10}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0xffffffffffffffe7) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r4 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)=0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r6, 0x40045567, 0x6) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r7, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r4, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r7, &(0x7f00000005c0)=ANY=[@ANYRESDEC=r1, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESDEC=r3, @ANYRESDEC=r2, @ANYRESDEC=r8, @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES32=r7, @ANYRES64=r2, @ANYPTR, @ANYPTR, @ANYRES32=r4, @ANYRESHEX=r5, @ANYPTR64, @ANYRES16=r6, @ANYRES16=0x0], @ANYPTR64=&(0x7f0000000780)=ANY=[@ANYPTR64, @ANYRESDEC=r3, @ANYRES64=r0, @ANYRES64=r4, @ANYPTR, @ANYRESDEC=r8, @ANYBLOB="ff05582771efa788da67ce4b03c64ed0b8a20c6b19e79a86db525a683770b7d6bc1f91e23971c28c2ac36b32709ae4b0767c3b4b3f6b9cac062d354ad337d8df81e14922f56d6b05c007f1d3ec67b6786c90c605dfaf600a67f722a337db5e5e0a8f1d31dae5fbe7ec4530a58f0d3d0e12e339f87907fd0e8d9ff2d1c82a7d11ee6cb21189c2ae7497d3ee29a5708359f7039cae008af346a9ecd0918053704fe032e8d873bf66025c66e793a6b3afd8e15f51bf0f68deeffd93912df563d440ace30203e34ed669412de450b399239163"], @ANYRESDEC=r6], @ANYRESHEX=r8, @ANYRES32=r3, @ANYRESDEC=r6, @ANYRESHEX=r0, @ANYRESDEC=r3], 0x6c) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r7, 0x540d) ioctl$EXT4_IOC_MIGRATE(r8, 0x6609) sendto$inet(r8, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:35 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x6) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r1, 0x540d) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) sendto$inet(r2, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:35 executing program 2: 04:34:35 executing program 0: 04:34:35 executing program 4: 04:34:35 executing program 0: 04:34:35 executing program 2: 04:34:35 executing program 0: 04:34:38 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:38 executing program 4: 04:34:38 executing program 2: 04:34:38 executing program 0: 04:34:38 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000080)='.\x00', 0xfe) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) chown(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) 04:34:38 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, 0x0, 0x0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:38 executing program 0: 04:34:38 executing program 4: 04:34:38 executing program 0: 04:34:38 executing program 2: 04:34:38 executing program 0: 04:34:38 executing program 2: 04:34:41 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:41 executing program 4: 04:34:41 executing program 0: 04:34:41 executing program 2: 04:34:41 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='m\xe7\xfc\xf4\xf2s\x85\a\xedenml\x89', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(r2, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x56, 0x8880, 0x0, 0x356) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:41 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, 0x0, 0x0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:41 executing program 2: 04:34:41 executing program 0: 04:34:41 executing program 4: 04:34:41 executing program 0: 04:34:41 executing program 2: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000026c0)={[{@fat=@errors_remount='errors=remount-ro'}]}) 04:34:41 executing program 4: syz_open_procfs(0x0, &(0x7f0000000200)='attr/sockcr/\xf0\xeaie') 04:34:44 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:44 executing program 0: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 04:34:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_targets\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/icmp6\x00') dup3(r1, r0, 0x0) 04:34:44 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, 0x0, 0x0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:44 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="02000000000000190000000000000000"], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:44 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, 0x0, 0x0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:44 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, 0x0, 0x0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:45 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:45 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, 0x0, 0x0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:45 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:45 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, 0x0, 0x0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:45 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:47 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:47 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="02efffffffffffffff00100000000000"], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000280)=ANY=[@ANYBLOB="dd000000005d0ae37681e3edfa041e97598edf791708e8b3c171db1a3890d952e570"]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:47 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="02000000000000190000000000000000"], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:47 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, 0x0, 0x0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:47 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:48 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:48 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="02000000000000190000000000000000"], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:48 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:48 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 491.264592] audit_printk_skb: 3 callbacks suppressed [ 491.264655] audit: type=1400 audit(1556166888.828:207): avc: denied { ioctl } for pid=25159 comm="syz-executor.3" path="socket:[59400]" dev="sockfs" ino=59400 ioctlcmd=0x5567 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:34:49 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x800000004, 0x6) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x406, r2) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000340)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x6) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r5, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r1, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r5, 0x540d) ioctl$EXT4_IOC_MIGRATE(r6, 0x6609) sendto$inet(r6, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:49 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="02efffffffffffffff00100000000000"], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000280)=ANY=[@ANYBLOB="dd000000005d0ae37681e3edfa041e97598edf791708e8b3c171db1a3890d952e570"]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:49 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x6) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r1, 0x540d) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) sendto$inet(r2, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:50 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:50 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:50 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="02efffffffffffffff00100000000000"], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000280)=ANY=[@ANYBLOB="dd000000005d0ae37681e3edfa041e97598edf791708e8b3c171db1a3890d952e570"]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:50 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:50 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="db400000000000563f9846804d0c1300"], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x506bb8aa1d92fee4, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:51 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:51 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="02efffffffffffffff00100000000000"], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000280)=ANY=[@ANYBLOB="dd000000005d0ae37681e3edfa041e97598edf791708e8b3c171db1a3890d952e570"]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:51 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:51 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:52 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='jo.stat\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:52 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:52 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:53 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:53 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x800000004, 0x6) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x406, r2) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000340)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x6) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r5, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r1, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r5, 0x540d) ioctl$EXT4_IOC_MIGRATE(r6, 0x6609) sendto$inet(r6, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:53 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:53 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:53 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x6) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r1, 0x540d) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) sendto$inet(r2, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:54 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:54 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:54 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x6) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r1, 0x540d) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) sendto$inet(r2, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:54 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x800000004, 0x6) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x406, r2) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000340)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x6) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r5, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r1, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r5, 0x540d) ioctl$EXT4_IOC_MIGRATE(r6, 0x6609) sendto$inet(r6, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:54 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="020000000000000000000000000000e93a036cd56211babc57e1b4ac096dfc86562170a60d6bbcf36e55dd1e1cdfafbb279e632d9d5853a31a23225860566254d69cf33fe54c40da49dcf3d8c000"], 0x24c}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000005c0)=ANY=[@ANYBLOB="70fe3df915ad9ea2b0046780699dba1370bf703891c0848ed0428827891a5cf5552f4b617f217c33324bdb3714497b52342bbbde114fd7efd81050a4932e3abd17c08870a7df1054620a372bca92534767f0ac076929ba018ea8be8d2047663923d194aa4c43152f083c091a3d4010fc8d33896050d11b4ee65619c3e87f570162c9d320a2250ddc6c0426b7e88114f62b83d729edbb891a2e9a3f8a2ebf92740312a6f8c66e8a9a87e0cb0f2a68da875c47ea5b7466c5ca66e8aec50e75d4442af22cfcaa844dd38cdf21d8b6a76414be6146ca5700e13a5ab31ab1851e"]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:54 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:55 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:56 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:56 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:56 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:56 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000280)=ANY=[@ANYBLOB="4f3a6d60ae2d91a537868997ee77044ea158fc7657b1c029019baf10c1a2435e1d5c58d72a7df2a20c41ec2c926941b093708290001520d2d31f89ac1bb8"]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:56 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:57 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$cont(0x9, r0, 0x0, 0x0) 04:34:57 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:57 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:57 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:57 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:58 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:34:58 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:00 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:00 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:00 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:00 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000003c0)=ANY=[@ANYBLOB="76a5cc0c40402552ca605e25d6cdaa5a40a0b49a9a68d41f19c78bf2f292b639df463f71c883a8bbf63a5c076bbb552897ba6c551a91989d0d24d4a4a9e4d5f0670cbf3de8e280d5fd1207349ea17bef"]) prctl$PR_SET_DUMPABLE(0x4, 0x2) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='.\x00') fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) 04:35:00 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:00 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:00 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:00 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:00 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:00 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) 04:35:00 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) 04:35:01 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 503.885636] FAT-fs (loop3): bogus number of reserved sectors [ 503.892799] FAT-fs (loop3): Can't find a valid FAT filesystem 04:35:03 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:03 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:03 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) 04:35:03 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:03 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:03 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:03 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:03 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) 04:35:03 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:04 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:04 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:04 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:35:06 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:06 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:06 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:35:06 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, 0x0, 0x0) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:06 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:06 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:06 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:06 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:35:06 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:35:06 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, 0x0, 0x0) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:06 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:06 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, 0x0, 0x0) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:06 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:35:06 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:06 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:06 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:06 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:09 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:09 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, 0x0, 0x0) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:09 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:35:09 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000), 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 04:35:09 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:35:09 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:09 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000), 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 04:35:09 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000), 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 04:35:09 executing program 5: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:09 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x2) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:09 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:35:09 executing program 5: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes 04:35:12 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:12 executing program 5: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:12 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64], 0x14b) 04:35:12 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:12 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, 0x0, 0x0) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:12 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:35:12 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:12 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:35:12 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:35:12 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:12 executing program 3: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:35:12 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) [ 516.446391] ip6_tunnel: ] xmit: Local address not yet configured! 04:35:15 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:15 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:15 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:35:15 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x9) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000100)={{0x8, 0x4, 0x5, 0x7ff}, 'syz1\x00', 0x20}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:35:15 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:35:15 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:15 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:35:15 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:15 executing program 3: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x400040, 0x0) getsockopt(r0, 0x3, 0x6, &(0x7f0000000480)=""/4096, &(0x7f0000000100)=0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) syncfs(r0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000140)={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x60, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x12}}, 'bond_slave_1\x00'}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x8}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030fb6ed740303030343030303000000000000000003da27eae03cdbf2551e29c947b745a3b9b295a1f87b72835f3aebd42ba910317c9541242dcaca21d1ffa5d8a9ec694c8376fd9d5463cf1dcd8b4784d90fd79d69dc1b4ec0e95c4581db888ca920463835752c6", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d0fa5f26d2fb18524fed8850f05805c8b3da6cb9a3a0d71236c4894886ca5f4730d8d2fe77490eb9f263562af13ffffffffffffdad1d9b0174541cde7386a6743cd7ace85f68d26b03fbd4efab51415a3a8870f0ec37858e6ec4f68b308beab53e3288351df619b1b932bac5c7e49b7cfd690", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x4e22, @multicast2}, {0x307, @broadcast}, 0x2, {0x2, 0x4e20, @multicast2}, 'veth0_to_team\x00'}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18, 0x1, 0x0, {0x4000000}}, 0x18) 04:35:15 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x1, 0x100000001, 0x80000000, 0x6, 0x0, 0x3, 0x21200, 0x2, 0x2, 0x4000000, 0x1, 0x0, 0x8, 0x10001, 0xfffffffffffffc40, 0x8, 0x3ff, 0x7, 0xe9a, 0x0, 0x4, 0x7fffffff, 0xe92d, 0x4, 0xffff, 0xffffffff, 0x8, 0x4, 0x3ff, 0x0, 0x6, 0x6, 0xfffffffffffffffe, 0x80000001, 0xfffffffffffff20a, 0x3, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x200, 0x528, 0x6, 0x4, 0xfffffffffffffbff, 0xfffffffffffffffb, 0x1}, r0, 0x7, 0xffffffffffffffff, 0xc) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:35:15 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 517.915907] audit: type=1400 audit(1556166915.538:208): avc: denied { create } for pid=25803 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:35:15 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:15 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[@ANYBLOB="cfeb0000", @ANYRES16=r1, @ANYBLOB="200025bd7000fbdbdf250c0000005c00010008000b007369700008000400000700000c000700200000000000000008000b007369700008000500040000000800080000000000080006007365640014000300ff020000000000000000000000000001080004004e20000008000400080000006000030014000600ff0100000000000000000000000000010800010002000000080004000200000008000300010000000800080006000000080004002000000008000800020000000800050000000000080007004e210000080001000300000008000500b9000000"], 0xe0}}, 0x44050) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000380)=r2) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000006c0)={&(0x7f0000000080), 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@newtclass={0x2c, 0x28, 0x400, 0x70bd26, 0x25dfdbfe, {0x0, r4, {0xfffa, 0xffff}, {0xffff}, {0x7}}, [@TCA_RATE={0x8, 0x5, {0xbe6, 0x6}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x82000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="203a000002c8bc61c49bfd51574239dc8336b39035652f4825ae7f9fc40e3966d8ba9a7073549503c5792270ce343600f0ada2261e6b8313ce0db38dca230d728a9acbd03d3b0143934eb573998be220cbaf990bc6c1d564bd1d58bb7bae34b77ce7e2ad60035721f718cdcab11b66076a197cce8926cfd47c2a70443bc71b5ff45f286058b5171a75fdeb29c2129b1fe3dad48b4db0091b7971e30dc4e67add15787ba4", @ANYRES16=r3, @ANYBLOB="000c29bd7000fcdbdf25050000000c0006000200000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x4000804}, 0x80) 04:35:15 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x3ff, {0xa3, 0xcd, 0x1, 0x10001, 0x1f, 0xfffffffffffffc00}}) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) [ 517.955279] audit: type=1400 audit(1556166915.548:209): avc: denied { write } for pid=25804 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:35:15 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x40) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0200fcffffffffffffff0000000000005acd30de137aff10093577bea048598ced9dc00bfbb36ccf3fa3f253a6a52445c4ecd6cdfdebe15235783e2949d270d15a7eaef4180b2b5a8ad701bc33469dad733bc7ac5906747499ecf469e3957364b33cae05e982da341f568a9a66b3bbfd92adb34a12d5369a7e1fb02f5b3276b39d79148c77db8cf3c0b190e6b8a546bfa5391d27cb2acd81de1a54d2"], 0x93}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x54) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="938e225acd23290b7c7035e8e1b6ebbeffe039121ce69f9677990ce8ee4135", @ANYRES64=r1], 0x14b) 04:35:15 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:15 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = getpgid(0x0) wait4(r1, &(0x7f0000000040), 0x8, &(0x7f0000000100)) sched_setaffinity(r1, 0x8, &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000080)={0x8000, 0x5, 0x6, 0x1000, 0x8, 0x5}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) [ 517.978632] audit: type=1400 audit(1556166915.618:210): avc: denied { read } for pid=25804 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 517.983720] audit: type=1400 audit(1556166915.618:211): avc: denied { prog_load } for pid=25803 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 04:35:16 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:16 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[], 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) 04:35:18 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:18 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:18 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = dup2(r1, r0) sendmsg$nl_route_sched(r2, &(0x7f0000000ac0)={&(0x7f0000000940), 0xc, &(0x7f0000000a80)={&(0x7f0000000100)=ANY=[@ANYBLOB="d40000003100330726bd7000fedbdf250000000024000100157610000600000008000300050000000000100000000000880001006e61740000009c00010010000b2e0000080003000000000000001000070000000800030004000000000010000e0000000800010078740000000010000e00000008000300ff0100000000100002000000080003003400000000001400030000000c0001006d6972726564000000001000200000000800010069666500000010001c00000008000300ffffffff00001400190000000c0001006d697272656400000000"], 0xd4}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000240)={0xfffffffffffffef8, 0x1, 0x0, {0xfffffffffffffc00}}, 0xffffffffffffffc1) 04:35:18 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:18 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000001cc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000001e80)={@broadcast, @rand_addr, 0x0}, &(0x7f0000001ec0)=0xc) r2 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001f00)={{{@in=@multicast1, @in=@dev={0xac, 0x14, 0x14, 0x1e}, 0x4e24, 0x4, 0x4e22, 0x200, 0xa, 0xa0, 0x80, 0x32, r1, r2}, {0x1, 0x1000, 0xfffffffffffffbff, 0x40, 0x8000, 0x6, 0xa0, 0x7fff}, {0x0, 0x6, 0x80000000}, 0x2, 0x6e6bb7, 0x2, 0x1, 0x2, 0x3}, {{@in=@rand_addr=0xffff, 0x4d2, 0x6c}, 0xa, @in=@empty, 0x3500, 0x5, 0x3, 0x2, 0x1, 0x1ff, 0x7fff}}, 0xe8) recvmmsg(r0, &(0x7f0000001b40)=[{{&(0x7f0000000000)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/164, 0xa4}], 0x1, &(0x7f00000001c0)=""/8, 0x8}, 0x3ff}, {{&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)=""/241, 0xf1}], 0x1}, 0x1a}, {{&(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000480)=""/156, 0x9c}, {&(0x7f0000000540)=""/23, 0x17}, {&(0x7f0000000580)=""/199, 0xc7}, {&(0x7f0000000680)=""/29, 0x1d}, {&(0x7f00000006c0)=""/33, 0x21}, {&(0x7f0000000700)=""/108, 0x6c}], 0x6}, 0x5}, {{0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000000800)=""/22, 0x16}, {&(0x7f0000000840)=""/207, 0xcf}, {&(0x7f0000000940)=""/163, 0xa3}, {&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f0000001a00)=""/96, 0x60}], 0x5, &(0x7f0000001b00)=""/60, 0x3c}, 0x8}], 0x4, 0x1, &(0x7f0000001c40)={0x0, 0x989680}) 04:35:18 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:18 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:18 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:35:18 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0x1e, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r1, 0x4) 04:35:18 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3de07f55548b2ff6404e", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:crond_var_run_t:s0\x00', 0x25, 0x3) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) setxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:pam_var_run_t:s0\x00', 0x23, 0x2) 04:35:18 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:18 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:35:21 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:21 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:21 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) readv(r0, &(0x7f0000001600)=[{}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000040)=""/132, 0x84}, {&(0x7f0000000200)=""/238, 0xee}, {&(0x7f0000000100)=""/101, 0x65}, {&(0x7f0000001400)=""/233, 0xe9}, {&(0x7f0000001500)=""/242, 0xf2}, {&(0x7f0000000180)=""/8, 0x8}, {&(0x7f0000000300)=""/118, 0x76}], 0x9) write$selinux_attr(r0, &(0x7f0000000000)='system_u:object_r:pinentry_exec_t:s0\x00', 0x25) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:35:21 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x4800, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030302c75736572f35e2fbb", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:35:21 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:21 executing program 2: 04:35:21 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffd) mmap(&(0x7f00006fc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) 04:35:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24, 0x0, @remote, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x3ffffff) 04:35:21 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'tunl0\x00', 0x24}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:35:21 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:21 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:35:21 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:24 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:24 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$void(r0, 0xc0045878) write$cgroup_subtree(r0, &(0x7f00000002c0)=ANY=[], 0xfffffffffffffcae) 04:35:24 executing program 2: 04:35:24 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:24 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x101c03, 0x10) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x0) 04:35:24 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:24 executing program 2: 04:35:24 executing program 2: 04:35:24 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="8930ceafff7f00005ea81cafd070896eed9886de98012ee92cc360190bc7e4169fc20c8a657abf29be4e0e29a63a49c342c199932e92c61adc35eece3f38bb1df7a483cff36db92f4b1619957700400000"]) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=[&(0x7f0000000080)='/dev/fuse\x00', &(0x7f0000000100)='\'\x00', &(0x7f0000000140)='rootmode'], &(0x7f0000000380)=[&(0x7f00000001c0)='-selinuxkeyring,\x00', &(0x7f0000000240)=':proc[%&ppp1\x00', &(0x7f0000000280)='em1:vboxnet0M!proc}lotrusted/$\x00', &(0x7f00000002c0)='$:\'\x00', &(0x7f0000000340)='vmnet0Mnodevem1eth1\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:35:24 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) open(&(0x7f0000000000)='./file0\x00', 0x4000, 0x8) 04:35:24 executing program 2: 04:35:24 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) 04:35:27 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/keycreate\x00') write$P9_RSTATFS(r0, 0x0, 0x0) 04:35:27 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:35:27 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd]', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:35:27 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(0xffffffffffffffff, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:27 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:27 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:27 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000200)=""/139, &(0x7f0000000140)=0x8b) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x11, 0x8, @udp='udp:syz1\x00'}}}, ["", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x1) 04:35:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x11}, 0x800) 04:35:27 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643de3b9be291b6a05182f7b062b0b1e58d7bfa9e171de9e48bce2bdde7e0dda08a8ece06f2e83294c4a3f8a2241ce3bcf560061e86029730283ba0910b4cd955f045371d38309b7d22655f15749bbe3745c20d7c9417a53845c3b18d56d57", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000080)) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:35:27 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x6, 0x4) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_mreqsrc(r1, 0x0, 0x22, &(0x7f0000000180)={@broadcast, @loopback, @multicast2}, 0xc) 04:35:27 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:27 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f0000001900)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x80800) recvmmsg(r1, &(0x7f00000018c0)=[{{0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000480)=""/215, 0xd7}, {&(0x7f0000000140)=""/116, 0x74}, {&(0x7f00000001c0)=""/58, 0x3a}, {&(0x7f0000000240)=""/20, 0x14}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/216, 0xd8}, {&(0x7f0000000280)=""/66, 0x42}, {&(0x7f0000000340)=""/101, 0x65}, {&(0x7f0000001680)=""/149, 0x95}, {&(0x7f0000001740)=""/170, 0xaa}], 0xa, &(0x7f00000003c0)=""/22, 0x16}, 0x8}], 0x1, 0x40002000, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001980)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303005013252b1400000003030302c7573657a5f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643dba66a7ce8ff62d75577b833347ff694abae94549df484353bcb9c3f229f0dd206a52c25f7220000000e100b5a325edc1a5094de35a74ed8e30f510f7d0bf696fabd4", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x8020000000000004, 0x411f, 0x40, 0x0, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x400}, 0x2c) r2 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000080), 0x4) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000001940)='/proc/self/attr/current\x00', 0x2, 0x0) 04:35:27 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x0) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0', "c0b55cde97ebc529d40e0b0b4f53b30aca8a56"}, 0x17) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x35, 0x6, 0x0, {0x2, 0x1, 0xc, 0x0, 'em1keyring*('}}, 0x35) 04:35:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x1f7, &(0x7f0000000040)={&(0x7f0000000240)={0x14, 0x30, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x33}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, 0x0, 0x0) [ 530.275980] audit: type=1400 audit(1556166927.908:212): avc: denied { map_create } for pid=26039 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 530.345191] audit: type=1400 audit(1556166927.978:213): avc: denied { map_read map_write } for pid=26039 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 04:35:28 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:35:30 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:30 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) 04:35:30 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:35:30 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(0xffffffffffffffff, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:30 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x802, 0xa) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000080)=[0x2, 0x7]) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) ioctl$TIOCSBRK(r1, 0x5427) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000000)) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000400)=""/4096) 04:35:30 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000004080501ff0080fffd0502010ab0b1000c00030018c6a7ec86273c960c0002000002fa17711104a6"], 0x2c}}, 0x0) 04:35:30 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYRESOCT=r0], 0x17) 04:35:30 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0xfffffffffffffffd) getgroups(0x0, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) r1 = getegid() setresgid(0x0, r0, r1) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f698f2c7e01000abdf014906ec11dfb95a6a667120adb0a2bad17da3f1beb9eae58ba0f7e8fd2126aaf61e3fd6ad638b07d667a00"/71, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) r3 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000140)={@dev={0xfe, 0x80, [], 0x13}, 0x55, r4}) r5 = dup3(r2, r3, 0x0) mkdirat(r5, &(0x7f00000000c0)='./file0\x00', 0x0) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000280)={0x16, 0x1, 0x0, {0x9}}, 0xc4) 04:35:30 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:35:30 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) [ 533.222333] audit: type=1400 audit(1556166930.858:214): avc: denied { create } for pid=26086 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 04:35:33 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:33 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, r0, 0x0, 0x1e, &(0x7f0000000300)='/selinux/commit_pending_bools\x00'}, 0x30) r2 = getpgid(r1) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write$eventfd(r3, &(0x7f0000000400)=0xffffffffffffff81, 0x8) fremovexattr(r0, &(0x7f0000000380)=@random={'system.', '/selinux/commit_pending_bools\x00'}) pipe(&(0x7f0000000440)) timer_create(0x3, &(0x7f0000000100)={0x0, 0x12, 0x2, @thr={&(0x7f0000000080)="7d15b2e9f9dc42b23586868da09241f19fce2dd3e1097f0d9aa4486db155fdeacc61638b3420b1d0c15210eb762f671b14497ff99d38430c67d44c105ddb1ebd099f7ef548ef628cc94ad983d7d989d12abef4cbfa5937afe4fc4874b6eca5c8fc21", &(0x7f0000000200)="f8bcf4e515d719040206477cef087017c18fa8dc356e1dc18448b88403fed751851f52052fe76b61297d98ba742176a66d864969910c8b48c7b33d714d3d05fa083dc6f1d644f3893114f5c242de5b46912e70eb2f19506a5e233b1cf4d14de4d2910b1660739678e203658303ad35d8a389504d45800a8f746b122a2326c187c759a01ed029bf1edbf809aa5b87513b00ee7e7a6e356d4e7ae26cb2cce32009c629f0119bd6d2cc491b2b9d51d7a832444370033c4f06187d7c2a25cd8d0307dab0be2847be329293120f50f5aa0a4e12b80e3baa55a22c9484bd3a8c79032b638ffa2f72b2a3e3"}}, &(0x7f0000000140)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000000)={0x9}) 04:35:33 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 04:35:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046208, &(0x7f0000000540)={0x4, 0x0, &(0x7f0000000900)=[@register_looper], 0x56, 0x0, &(0x7f0000000840)="2ba063fb309ec7fdbfb08e6e91baee7d7d4599fe14129a4d426834556ae4201ca1ee9c2231708e18a47bc68a2a79a0b4a531f6ff6d3095bbabd89d9f9a38c3d9f6d958dd03695246acccffd5f34fb78adb0f0810a165"}) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000380)='/group.stat\x00') ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x8, 0x0, &(0x7f0000000500)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f00000009c0)}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000001000/0x1000)=nil, 0x1000}, &(0x7f0000000480)=0x10) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0), 0xc, &(0x7f0000000600)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00022bbd7000fedbdf253e4bb6697223f51228000200040004000800020001000000080001000300000008000100c581000008000200ffffffff68000100080003000000000044000400200001000a0067240000000fff020007000000000000000000000001bc0700003000020000000000000000aa02000000100001007500400000000000000000000000000000000000ff75b5531c6f368be0b7c9dc6d"], 0x1}, 0x1, 0x0, 0x0, 0x20000044}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0xe, 0x0, &(0x7f0000000680)=[@acquire_done={0x40106309, 0x0, 0x48}], 0xfffffffffffffeb3, 0x0, &(0x7f00000007c0)}) 04:35:33 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000480)="6b459f80176c2f240f51e0abe44958e2603d138ac6b708e2ccc1c5cc07df2474c2208a74584e7b4720c06f5ea9a6811b5191fae30f0300e3557ff0ebf30a71e1b20e9ff83975c20826da17c92cfe1de5bd2e7fe99eec7cae318007468f6187f3bb1a6a5e4d19515e37baa73db01a3aeca0726f3bcf956255e9684200595dd81665276824d6275ab359b93f262200c4937b7574659e55fa036b43ec8c15d0ec59ab8f1b27e522ca3c346e7e7f957aea4b6310e3dd77499065facf609f896bddba71113f5b2e6a0adcd64f894a19ce2ceb11dc67c97fe878d6c49f40b6ebadb6a2c9e4be447fa1edc0702b8ea0fb7f93d8a5db5774", 0xf4, 0xfffffffffffffff8) keyctl$invalidate(0x15, r0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000000c0)={0x18}, 0x18) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x0) 04:35:33 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(0xffffffffffffffff, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:33 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x14) 04:35:33 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 04:35:33 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) 04:35:33 executing program 4: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:33 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRES64=r0], 0xfffffffffffffefb) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x12, 0x14, 0xc, 0x14, 0x3, 0x0, 0x5, 0x5a, 0x1}) 04:35:33 executing program 2: r0 = gettid() clock_nanosleep(0x2, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x15) tkill(r0, 0x1000000000015) 04:35:36 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:36 executing program 4: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:36 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000000)={0x80000000}) 04:35:36 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, 0x0, 0x0, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1b) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x80000000) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") 04:35:36 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000040)={'caif0\x00', 0xfffffffffffffffe}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000080)={0x18, 0x1, 0x0, {0x2}}, 0x18) read$FUSE(r0, &(0x7f0000000480), 0x1000) 04:35:36 executing program 4: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:36 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x1, 0x3, 0x7, 0x0, "3a557ec2592f852939edb55ec8a938d6e99a639b75c61137d6a873e783446509c3c6a4dfd9046bd2649a42ed4a0f742ce5b2f136c417d462e18ed07d90cf57", 0x6}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000080)="4f585415fef9a5ba00d8eb1ac9552c570d5fc9f35b349c016056064eee3f31988dd5f85a357672aab7b7559c8ac3825345f062c6476d77b34f128a814cd78aca985201b4db00080a699b551cf44072a75150ca560b1801e3a07e056cefa4370b59e9db406679950211ca85e5c575a5cb9c9bc46196189439362343081a331baaacb33d4939b1e14ee2", 0x89}, {&(0x7f0000000140)="6579ab1f04dc28553c5dd9eea870cc37617e72ea4c", 0x15}, {&(0x7f0000000200)="c367082ea87baba14330b9baa133940abf49b5982b52a508c7ad79dc39c5da9b7153d3fbec7efd132c40c8651cf0f1f7087c2e75aac5bcbc4124bb2bf6bfeebbacef5a299d1491e5d58ffdd1e77a8227d0c804c75231a9101f689c3842", 0x5d}, {&(0x7f0000000180)="317f9cab99171453c44758a51d", 0xd}, {&(0x7f0000000280)="239c849f6bd424606dff08af6a06371867d3f28b24b3c10258977dd8396daa4d704d7d80df9ba49b7ea6c78960b06cbf07a0b8fb3d72af2dbd9e77fe21", 0x3d}], 0x5, &(0x7f0000000400)=[{0x60, 0x6, 0x3, "8e59ed5a6d92fbf00532dbfae6fb2ddbf88930cf4500902dc878c955b07df6e3f96991fe7b77d0afcdcfeb4f96f975255e82041a5404f58a8fdd0b56c16ab17fce040b1316f3b8250b0795b037052add"}, {0xb8, 0x1, 0x1, "3db6bfbcf43c757dc13e1e8f3434bbf51a56d88638ff80e709dfd403f3fc0854232542db22eef6f2a486be486d30f6fe1af4e65ad5002e3ef361ec1e140749f72a23085b37b8d866401fcb1b66ff944dc9b91c83502445b8325ed68ee0b863b041f6db1f404d4179a5204e56b3bed78737f9667d0bfb09e0e78cf3d010fade0bb2cc909085259c9b85c8e8ad9a8fff61844297b4fe86294f245758b8f56af42282d3"}, {0x90, 0x0, 0xa4, "db3e11aa38bec0fe02187de5674c2460ed308c0793310034e96c0c911605c89f3506a0732f80ab4c08b9654dae826141bf3e26801efdda18464daf291b561b08dff6939a46a7acdd5ff2f275555cde6cfed126efa714b5a3f5ce154ac15972b49db72aa54f8044a2b9b21a495edae3f1ca4c4f2e507a1b8f53339c91"}, {0x98, 0x117, 0xa6, "67a212a963e79da98dd0ecc365b391367ea1283f811c7cd86f5225d29fb4fd7ae99121e1535f25264849e5f50bc18b17d2bf956c23b029510b36ab2e75d8326d8e09dfc211404dbb3a05fde2bf233a4d1fc50cdd4be28bbce939344fe021755bb59a6d6c426ad56a580329d67340c41eefc68767cdd6c527ea91cd1bebbdd84e5f24f746a42bb3a0"}, {0x80, 0x113, 0x10000, "833dc8c022182b46f2028d81eae5ca83af150f82842053cb2546cbaf81eeae5fee20495ff621bd90ad07d6e4c4ad4b81336074d02f786f2ae06f2ded4cdfd0c2eed95c040301e98e0fe27fee57451a065902e2652ff3fbfffe3b85b31bac48d952b4a0971c3b7ee77391b4b2b6"}, {0x108, 0x0, 0x6, "f9c60b5f70576bad25bf579fc3b595669cfa6bdd6f75e611bfb3b85a117bac08e58f93f172f7abd040708793e01b62a0bd7b43c10bffdb9e696f17ac32a52f5bee0998c7295f32909e0a7e7043ba55fae33c9523688b1226f9fc60ead4b4145d3dab18da4dc2f5ba3888a96969b822bc4559c46509d622255ef5ad8e28d72b87a83a2c0b1ac80544469c57e98b27b0bb189318de2b4beaad1f207e7e1bd473efa8bbcc189f2806b2cd781d3f147107c7b707caab701ad3d847665559156be1caca421bc5d3280d8b04c1fd0e9e867a68373028e387aad3b32cf523dc09e80b9732eac3f94f8b7f6e4ae2a58f0982d95f74a64c07f5eb"}, {0x1010, 0x11, 0x800, "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"}], 0x13d8}, 0x4000040) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:35:36 executing program 2: open(&(0x7f0000000280)='./file0\x00', 0x41, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xfffffef6) rename(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='./file1\x00') getdents64(r0, &(0x7f0000000380)=""/201, 0xc9) getdents(r0, 0x0, 0x0) 04:35:36 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:36 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="00fb1500401e43d26ef3db637098b6fe5aa591e6c7"], 0x15, 0x2) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000480)={0x1f4, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffffffffffff}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xeed}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2ba}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0x114, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffb}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffffc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xae03}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1f4}, 0x1, 0x0, 0x0, 0x40}, 0x40) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r3 = geteuid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x80000, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r2, &(0x7f00000000c0)={0x18}, 0x18) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000380)={0x1, 0x1, 0x2, 0xea56}) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000003c0)={0x7}, 0x4) 04:35:36 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x14) r1 = fcntl$getown(r0, 0x9) ptrace$getenv(0x4201, r1, 0x1000, &(0x7f0000000040)) getpid() ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000080)) 04:35:39 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:39 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:39 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000040)={0x7d47234d, 0x26b, 0x1}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) syz_open_procfs(r1, &(0x7f0000000100)='ns\x00') ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)={0x1, 0x0, [0x0]}) 04:35:39 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff}, 0x4000) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000005c0)={0x2, 0x3, 0x4, 0x9b0, 0x5, [{0x2, 0x3, 0x8001, 0x0, 0x0, 0x400}, {0x8000, 0x400, 0x39aa, 0x0, 0x0, 0x480}, {0xfffffffffffffffe, 0xfff, 0x8, 0x0, 0x0, 0x100}, {0xfff, 0x2, 0x3ff, 0x0, 0x0, 0x80}, {0x12, 0xfff, 0xbc, 0x0, 0x0, 0x2}]}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRESOCT=r1], @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f6964ea", @ANYRESDEC=0x0, @ANYBLOB="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"]) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000000c0)={0x18}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='cgroup\x00') ioctl$TCSBRKP(r2, 0x5425, 0x1) fsetxattr$security_evm(r2, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="93c63e6900f9ffffffffffffff0000002ede3bfce44e169cbeda7498ce21dc150bbb5755b621b6f34eda13c536d84201edc92b01b3ab3f710111"], 0x10, 0x2) 04:35:39 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, 0x0, 0x0, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:39 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 04:35:39 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file2\x00', 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) stat(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1804060, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffffc}}, {@max_read={'max_read', 0x3d, 0x5}}, {@max_read={'max_read', 0x3d, 0x1ffe0000000}}], [{@fowner_gt={'fowner>', r3}}, {@seclabel='seclabel'}, {@subj_role={'subj_role', 0x3d, 'lo)\x86vboxnet0'}}]}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0087d5edf83f923f76f861d8cc153dd30b7a4a7cb427f9aa136fd2993b74173aebb8d1693a8296fa86ddb6a19b3ee52c53dbf63b338d4f2fbea3e241a1f89e2c205c5c3157e51d3ecd356cc75adf703d3aa153a6a49b0ad752a7a80985629191a60be930e0d6cdb1e67590519e4c46306768ebc6bc4b59f07fd3c31d48260fe3cc78fe3ae56d2d067218e95278c209611046a0776c45176a67cc04d7ec734edb1220e5f634ba2fe41ba3b505e0494b3a1f8652e071b09dcd89248eeb0c375d70190351b2"]) write$FUSE_NOTIFY_POLL(r4, &(0x7f00000000c0)={0x18}, 0x18) 04:35:39 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 04:35:39 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x1000000000002, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, 0x0, 0xfffffffffffffdeb) 04:35:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x3, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0xf4, 0x3f, 0x6d, 0x9}, {0x1, 0x7, 0x5, 0x7fff}, {0x1000, 0x100, 0x80000000}, {0xfffffffffffeffff, 0xb3, 0x401, 0x8}, {0xffffffffffffff00, 0x4, 0x8, 0x9}, {0x32, 0x8, 0xe225, 0x1f}, {0x8001, 0x7, 0x3, 0xff}, {0xfffffffffffffffe, 0x1, 0x4, 0x7}, {0xffffffffffff7fff, 0x5, 0x259, 0x8}]}) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast2, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x1f, 0x4e24, 0x2, 0xa, 0x80, 0xa0, 0x0, 0x0, r1}, {0x2, 0x9, 0xfffffffffffffffa, 0xfffffffffffffbff, 0xee, 0x100000000, 0x40000, 0x70300}, {0x3, 0x1, 0x29f4a865, 0xa6eb}, 0x9, 0x6e6bbe, 0x1, 0x1, 0x3, 0x1}, {{@in=@multicast2, 0x4d2}, 0x2, @in=@remote, 0x3507, 0x0, 0x2, 0xff, 0x47, 0xffffffff}}, 0xe8) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000000)={0x0, 0x8000, 0x401, 0x9, 0x10000, 0x10001}) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000100)={'nlmon0\x00'}) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:35:39 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c005251f886a2d68b0db267a6af862895fe1b9e7235093367e0f626641b979be494f1e697a3368b72d09b4076d511a0c96293145baa6d2a25979f5d62bb4e56be99"]) lseek(r0, 0x0, 0x3) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:35:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) vmsplice(r1, &(0x7f0000000640)=[{&(0x7f0000000340)="ba", 0x1}], 0x1, 0x4) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000007ff, 0x0) 04:35:39 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:39 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:39 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) open(&(0x7f0000000000)='./file0\x00', 0x2, 0x17) 04:35:39 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) r0 = epoll_create1(0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, 0x0) 04:35:40 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, 0x0, 0x0, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:40 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) lseek(r0, 0x0, 0xc771d27219392220) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000080)={@ipv4={[], [], @remote}, r1}, 0x14) 04:35:40 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0xbd652cf7c2cbe182, 0x0) ioctl$void(r0, 0xc0045c79) write$P9_RSETATTR(r1, &(0x7f0000000080)={0x7, 0x1b, 0x2}, 0x7) close(r0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:35:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r1, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e20}, 0x6e, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x28, 0x1, 0x1, [r1, r0, r1, r1, r1, 0xffffffffffffffff]}], 0x28, 0x80}, 0x40000) 04:35:40 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:40 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:35:40 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:40 executing program 2: r0 = socket(0x2000000000000010, 0x802, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010065580f003693e0000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe000000070002000000000000006c6c256f1a272f900e2e117c22efc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2c000005deef11a822c9afea7dc2add7f671fd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d09b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8", 0xfc) 04:35:40 executing program 0: r0 = inotify_init() fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000040)='TRUE', 0x4, 0x1) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r2, 0x810, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0x4102, 0x0, {0x6e, 0x13, @l2={'ib', 0x3a, 'tunl0\x00'}}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20004840) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000080)={0x0, 0x4, 0xec, 0xfffffffffffffffa, 0x2aa}) fcntl$setlease(r1, 0x400, 0x3) 04:35:42 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:42 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_buf(r1, 0x0, 0x2c, &(0x7f00000006c0)=""/84, &(0x7f0000000740)=0x54) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0xfffffffffffffd3b) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200000, 0x0) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x4) 04:35:42 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:42 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) 04:35:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0x0) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, 0x0, 0x0) 04:35:42 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0), 0x0, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:42 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:43 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) fallocate(r0, 0x8, 0x40, 0x401) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:35:43 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:43 executing program 2: mmap(&(0x7f000000c000/0x3000)=nil, 0x3000, 0x1, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0x1, 0x0, 0x0, 0x0, 0x0) 04:35:43 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x78) 04:35:43 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x280, 0x0) renameat2(r1, &(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x6) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:35:46 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:46 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:46 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x10002, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:35:46 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) r1 = getpgid(0x0) r2 = getpgid(r1) ptrace$poke(0x5, r2, &(0x7f0000000040), 0x10001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2000000, &(0x7f0000000580)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303037373737372c6d6f64653d30303030303030303030303030303030303030303030322c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303030303030303030323730312c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030352c6d6f64653d30303030303030303030303030303030303030303000000000000004016673726f6f743d2f6465762f66757365002c7375626a5f726f6c653d2f6465762f66757365002c646f6e745f61707072616973652c7569643d", @ANYRESDEC=r3, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000080)="c421b5e437dbe126420f0d4f06c401895f8804000000c44299a6d36742e73ec4217ae6ec46dbe4f2aec4c1815483cb8e0000") write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:35:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) 04:35:46 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0), 0x0, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:46 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffd) mmap(&(0x7f00006fc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) pread64(r0, &(0x7f0000000040)=""/44, 0x2c, 0x0) 04:35:46 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:46 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000080)={0x2, 0x0, {0x2, 0x25, 0x10, 0xc, 0x9, 0xffffffff, 0x1, 0x161}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000000c0)={0x18}, 0x18) 04:35:46 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7d, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r0, 0x409, 0x0) 04:35:46 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:46 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000140)={0x3, 0x7, 0x5aa}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@dev, @in=@initdev}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) r2 = getegid() stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) getresgid(&(0x7f0000000480)=0x0, &(0x7f00000004c0), &(0x7f0000000500)) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)=0x0) r10 = getgid() getgroups(0x9, &(0x7f0000000740)=[r2, r3, r4, r5, r6, r7, r8, r9, r10]) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYRESDEC], 0xfffffffffffffe92) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@mcast1, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback, @loopback, @remote, 0x7, 0x9, 0x1f, 0x400, 0x9, 0x80, r11}) fdatasync(r0) 04:35:49 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:49 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:49 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x202180, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000040)={0x7, 0x79, 0xfffffffffffffffc}, 0x7) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000000c0)=0x9d9) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2d, 'cpu'}, {0x0, 'io'}, {0x2d, 'io'}, {0x2b, 'pids'}]}, 0x13) 04:35:49 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000480)={0x0, 0x0, 0x5, 0x0, [], [{0x7, 0xfffffffffffffe01, 0xd1, 0x4, 0x3ff, 0x5}, {0x800000000000, 0x100000000, 0x2, 0x9, 0x100, 0x94}], [[], [], [], [], []]}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:35:49 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x88) bind$inet(r0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8084, 0x0, 0x0) write(r0, &(0x7f0000000240)="7156f3067e921c083dff97481f5bc5cd61334192a95666f80b75b31d9699830d97437552bdaad1cbb18b16d977bae3c17370d4d4af7ac588cfa005da557fff7ba76b639e807c4a791890f9c9b66ddab34fbddd368fadd69db9959c94b8b867ae533af0a197d35a2bb7a4db0af6ba1134ad2216f390ac425b245e6dd0e37a38717ff44b148eb7a3e8a4dac8fe0658adc32c58596a502c3df3d9142ad13d344d764041fc45b577fdb1f19b2fb4d95396fc6ef552b068407141a5189f9c61b80293948514ae08741c68c29f", 0xca) 04:35:49 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0), 0x0, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:49 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0xe2e4, 0x20000ffd}) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYPTR], 0x8) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl$FS_IOC_FSSETXATTR(r1, 0xc020660b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x980000}) 04:35:49 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chdir(&(0x7f0000000040)='./file0\x00') write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:35:49 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000000)) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:35:49 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f00000000c0)=0x8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 04:35:49 executing program 2: listen(0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) 04:35:52 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:52 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000003c0)=""/2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f00000002c0)=@generic, &(0x7f0000000140)=0x80, 0x800) bind$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) syz_execute_func(&(0x7f0000000000)="f3e100def9575c8ac2c2c9734e424a2664f0ff064a460f3038082e67660e50e94d00c9c9c4625dbae5feabc4aba39ddf4507e50c420fae9972b571112d02") io_setup(0x0, 0x0) setxattr$security_evm(&(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = dup(r2) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) stat(0x0, 0x0) lchown(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) creat(0x0, 0xfffffffffffffffc) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000240)={{0xa, 0x4e23, 0x7, @ipv4={[], [], @broadcast}, 0x3}, {0xa, 0x0, 0x0, @loopback, 0x7f}, 0x0, [0x5b, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x7, 0xc9]}, 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x10000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f00000000c0)={'teql0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2b}}}) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x20141042, 0x1000000000000) r5 = getpgid(0x0) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000500)=r5) ioctl$GIO_CMAP(r3, 0x4b70, &(0x7f0000000540)) prctl$PR_GET_KEEPCAPS(0x7) ftruncate(r4, 0x80080) 04:35:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001140)="0adc03263c343f319bd070") r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$update(0x2, r1, &(0x7f00000002c0)="d1b3862e802a27386f208945d913574addd3a4169051926efda588c78fffeaca24809a3bb7d231aebf6ab145104398b226f5167f0b78e0c358b344e635794a9a96d6f74ad4139d9c5f27beab2609d5e1248eb6184935bfc2f632701b6b6c063c8d29a13f07", 0x65) 04:35:52 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd", 0x4b, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:52 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000004000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x5}, 0x18) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000080)={0x18}, 0xdd) 04:35:52 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:52 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:35:52 executing program 2: r0 = socket$inet6(0xa, 0x802, 0x0) connect(r0, &(0x7f0000000540)=@in={0x2, 0x0, @remote}, 0x80) 04:35:52 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000001c0)='./file0\x00', 0x8408, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) exit_group(0x0) 04:35:52 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x102) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080)=0x5, 0x4) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:35:52 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd", 0x4b, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:52 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000040)={{0x1}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) 04:35:55 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:55 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2ce7726f7500003d9d41", @ANYRESDEC=0x0, @ANYBLOB="2c49a3322d2a491169735918790000001c8c55"]) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:35:55 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4040, 0x0) 04:35:55 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd", 0x4b, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:55 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x8000, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000040)="af8265fa8145b160999c5c2382677d5f1b728c661a9208efddec65a50c0a856d4d71259d56245be8a8fd9b1d077f4c024fbde1f493ed5748b9c3a7a71dce46a2bd482fef0f49943b243df2fe4951e3ee26911434a44cbb4f40a554fd9ed5a65e2405e5ef11fd0ce48b568988d5f26e5ecda20f9bfd824d9f2dd175abfac59baf402724907e0dc2b7ed245c98b6997e58afacda4e383675b3fac8e625da46d9149cb48aeaa55e32016bdb2b8fbb0b994046432ec66b46b784b76280bb1df6ba5346fbb50dfcd1878b21fe8f9c51687b21bf087d47560cb6d7c555f5d67e9f8d7a5474b729022f343b6020526aa68ae506a1c093eeab10a2d6") r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:35:55 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0xe2e4, 0x20000ffd}) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYPTR], 0x8) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 04:35:55 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6, @in6=@dev}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000240)=0xe8) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:35:55 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYRES64=r0], 0x8) 04:35:55 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="25fed0db1d91607f8248e6735dc49e2c0047a7228cab7abf57e1665f3249184d3ffb6f882c08af08ccb4437283d1a8b58caf414515e5f3854dddb2e5f144495c70d9e6d62eff96a476e59159cf90ea9a867bb03f630221ac8675"]) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) prctl$PR_GET_TSC(0x19, &(0x7f0000000080)) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x5}}, 0x18) 04:35:55 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000000)={0x1f, 0x1f, [0x3, 0x10c, 0x0, 0x197c, 0x67a5], 0x1}) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) r2 = syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x100000000, 0x200000) fsetxattr$security_smack_transmute(r2, &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x3) 04:35:55 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x810) 04:35:58 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:58 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18, 0x1, 0x0, {0x4003}}, 0x18) 04:35:58 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:35:58 executing program 2: clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_procfs(0x0, 0x0) tkill(r0, 0xf) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f119bd070") ptrace(0x4206, r0) wait4(0x0, 0x0, 0x0, 0x0) 04:35:58 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c", 0x70, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:35:58 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:35:58 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000000)="da100e1334d2bf2f4bf972fa349b82e5769c7eeb1af48579e2bed77527d59760c1e3") open(&(0x7f0000000040)='./file0\x00', 0x220940, 0x6) 04:35:58 executing program 2: r0 = socket(0x1, 0x1, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0xe) r1 = gettid() setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) getgroups(0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) write$P9_RFLUSH(r0, 0x0, 0x0) tkill(r1, 0x1000000000016) 04:35:58 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$VT_DISALLOCATE(r1, 0x5608) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:35:58 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) fcntl$getown(r0, 0x9) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) 04:35:58 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) prctl$PR_SET_FPEXC(0xc, 0xa0083) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:35:58 executing program 0: openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:36:01 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000dc9ff0)={0x2, 0x4e20}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000000)=0x8080000001, 0x4) r2 = accept4(r1, 0x0, &(0x7f0000002a80), 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) socketpair(0x0, 0x0, 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0xffffffffffffff89) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x800) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) getsockopt$sock_timeval(r3, 0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_DEL(r2, 0x0, 0x20000080) getpeername$inet(r1, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) sendto$inet(r1, &(0x7f00000002c0)='I', 0x1, 0x5, 0x0, 0x0) recvfrom$inet(r1, &(0x7f00000000c0)=""/173, 0x448, 0xff, 0x0, 0x0) 04:36:01 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) fcntl$setlease(r0, 0x400, 0x2) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:36:01 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd<', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:01 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c", 0x70, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:01 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:01 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getpeername$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10) r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000200)="0e0d356c5b7e54b1ec0ade08c77d08c8f84d4ff07d583a8ec7588e48bfd9e0092ac5b901debe1869d8e97f801828a45a4091d2890cf97772e98dc752b7726a492a673c370d8f91d072c1c4eaab0b968272ec00c1a56dc0d04ac30d9b2cfdf8ddac739d3e568e0ea52e460c9b314332aaef750a85ed9bbc529db2cf22b33304340cbb0328da32a69a89098d37afb901560f07333aa49cebd462d3ccc4615707a0a400720b3d690f18f4843c0fc6bd91c6ebf82e6fc5fca2b01aa0cf116783525db588746ad55caf054a28c2e00eb658b830bc8d90cdbc9f5d86fca771cdea9a8bbd0e251ce8795149d5", 0xe9, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r1, 0x6, 0x80000000}, &(0x7f0000000140)={'enc=', 'raw', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000300)="71d7a668fd54db4d000f0f620d90b2685cdcee5fd2d32a3839545e4089c70f899d03f2f2a810af18458e", &(0x7f0000000340)=""/10) prctl$PR_GET_NAME(0x10, &(0x7f0000000380)=""/12) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:36:01 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x105240, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x28000800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)={0x180, r1, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bridge\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x17}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3f}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x2a}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x15, 0x22}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x80000001}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x800}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xb4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xd09d}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1ff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xed5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x180}, 0x1, 0x0, 0x0, 0x8080}, 0x4810) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r2, &(0x7f00000000c0)={0x18}, 0x18) 04:36:01 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) readlinkat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/76, 0x4c) prctl$PR_SET_TSC(0x1a, 0x3) 04:36:01 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c02"]) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:01 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) lseek(r0, 0x0, 0x800000000000) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0xfffffffffffffff5, 0x1}, 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x80, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x26}}, 0x10001}, 0x1c) 04:36:01 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0xffffffffffffffcb}, 0x18) 04:36:04 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:04 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="cecbd9cd4b2d0dadeb5c1f43402b29a7c5e64c95d6418c18ca32a73a20830533db2a5253047748b23b88b8849f34aa0b32c79819a736ec61186f81dfb4c0e7bac12b5e304c71d2a6dd11ac1cb2837102e2ffb3b215e8df7ea54f7047c6aa4e6a430a407aaa08dba0b0fbff935e42aae74c8df2903c41f32950f6503f122d617c98e337f88cbe3976a2504dc411e7acdf4333fa69c9ba6728ae92551f53156526cfb2171764f45eb97c88ae2ef4f0734c6bb2c5ef42726eed33e163ba9a"]) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) read$FUSE(r0, &(0x7f0000000480), 0x1000) 04:36:04 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:36:04 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c", 0x70, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:04 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="5500000018007f1412fe01b2a4a280930a06000000a843069100000011000f003502000006f002001900154002000001d40000dc1338d54400009b84136ef75afb83de44110016000d0003000000060cec4faba7d4", 0x55}], 0x1}, 0x0) 04:36:04 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) r1 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30d) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000340)={{}, {0x1, 0x6}, [{0x2, 0x2, r1}, {0x2, 0x2, r2}], {0x4, 0x1}, [{0x8, 0x4, r3}, {0x8, 0x0, r4}, {0x8, 0x3, r5}], {0x10, 0x4}, {0x20, 0x2}}, 0x4c, 0x1) 04:36:04 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:04 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x90000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000380)=0x3, 0x4) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400, 0x0) r3 = dup3(r0, r0, 0x80000) linkat(r2, &(0x7f0000000080)='./file0\x00', r3, &(0x7f0000000100)='./file1\x00', 0x400) [ 566.564125] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.2'. 04:36:04 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[@ANYRESHEX=r0], 0xffffffb5) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f00000000c0)=0x5, 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000100)={0x0, 'bond_slave_1\x00', 0x4}, 0x18) 04:36:04 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x3a0914c44f7b802d, 0x1b00) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x400000003fd, 0x0) pwritev(r0, &(0x7f0000000740)=[{&(0x7f0000000000)="d5f2237dd2b36b0c05c8a899fc9f3e1f0a527f8bed61b60b15f6063ebf0bed7bbfd5f3c9bb4d1079afaff94c462d", 0x2e}], 0x1, 0x0) execve(0x0, 0x0, 0x0) 04:36:04 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) 04:36:04 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000003280)=@nat={'nat\x00', 0x19, 0x5, 0x69c, [0x20002300, 0x0, 0x0, 0x20002428, 0x200027d0], 0x0, 0x0, &(0x7f0000002300)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x13, 0x42, 0x883e, 'team0\x00', 'ipddp0\x00', 'hwsim0\x00', 'batadv0\x00', @local, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0xc8, 0xf8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @snat={'snat\x00', 0xc, {{@remote, 0xffffffffffffffff}}}]}, @arpreply={'arpreply\x00', 0xc, {{@dev={[], 0x21}, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0x9, 0x10, 0x0, 'ip6tnl0\x00', 'caif0\x00', 'veth1_to_team\x00', 'ip6gre0\x00', @remote, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0x0, 0xff, 0xff, 0xc535b893c87382e0], 0xd0, 0x128, 0x158, [@mark_m={'mark_m\x00', 0xc, {{0x3dd, 0x5, 0x2, 0x3}}}, @mark_m={'mark_m\x00', 0xc, {{0x1, 0x0, 0x3, 0x2}}}]}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}, @common=@dnat={'dnat\x00', 0xc, {{@local, 0xffffffffffffffff}}}]}, @snat={'snat\x00', 0xc, {{@empty, 0xfffffffffffffffd}}}}, {{{0x9, 0x40, 0x22eb, 'bond_slave_1\x00', 'vcan0\x00', '\x83eth1_to_bridge\x00', 'bpq0\x00', @remote, [0x0, 0x0, 0x0, 0x0, 0xff, 0xff], @broadcast, [0xff, 0x0, 0x0, 0xff, 0xff], 0x1c0, 0x1f0, 0x220, [@cgroup0={'cgroup\x00', 0x8, {{0x8, 0x1}}}, @comment={'comment\x00', 0x100}]}, [@snat={'snat\x00', 0xc, {{@remote, 0xfffffffffffffffd}}}]}, @arpreply={'arpreply\x00', 0xc, {{@empty, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x1b, 0x0, 0x0, 'tunl0\x00', 'ip6gre0\x00', 'bcsh0\x00', 'hsr0\x00', @broadcast, [], @remote, [], 0x70, 0x70, 0x19c}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:xconsole_device_t:s0\x00'}}}}]}]}, 0x780) 04:36:07 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x0, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000040)="26e2469136d1a7f9a886a236", 0xc) 04:36:07 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="e6643dce4efc0fb43e7e909f0176d1b51ca0a1fc84884a098528d1ae7e06b161a61bd523303d5ac40a6e6cb07a0df743a736e2e43cce66977d2780797e009c694c4a0f6e09ead24dd6de398f45223ed5a960250b74f0df202c81ab7b825509fb81f9a0be35ac209ae25b00ae8a8c54fca4", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:07 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYRESDEC], 0x14) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000000)={0x6, 0x1}) 04:36:07 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb0", 0x83, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x16, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffffff00000000, 0xe, 0x0, &(0x7f00000000c0)="c10e85f98ad0e679055e19f25b0d", 0x0, 0x1f36}, 0x28) 04:36:07 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) close(r0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000400)="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", 0x1000, 0x0) r2 = add_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="ffe30f0dc3e6302b504bcf4505694f2a7f437b746fb249a75870014b5b46eebe8d6986b7cdf962225c7c8a27bbbed41ebdd8c99d731290e24e64bbc75ea94d218672cf9c4a1406f09f0a", 0x4a, 0xfffffffffffffffa) r3 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$negate(0xd, r1, 0xffff, r3) utimensat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x100) 04:36:07 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) write(r1, &(0x7f0000000280)="a2", 0x1) r2 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x1}}, 0x48000) close(r1) 04:36:07 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x0, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:07 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) 04:36:07 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) mknod(&(0x7f0000000000)='./file0\x00', 0x420, 0x7) 04:36:07 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000180)=0x7, 0x1ca) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}}) 04:36:07 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000000)={0x8, 0x800}) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 04:36:07 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:36:07 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000040)) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:07 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb0", 0x83, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:07 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x80) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1000010, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030203030303030303030303034303030302c2ae52d206ce27573", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x68e) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x2, 0x7, 0x1ff}}, 0x30) 04:36:07 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) ioctl$TIOCSCTTY(r0, 0x540e, 0x4) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x400, 0x0) 04:36:10 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:10 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000080)=0x81) dup2(r0, r1) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00roup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lseek(r0, 0x0, 0x4) lseek(r0, 0x0, 0x7) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:10 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x0, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:10 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) ioctl$sock_ifreq(r0, 0x897f, &(0x7f0000000000)={'nlmon0\x00', @ifru_ivalue=0x40}) 04:36:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = socket$inet(0x2, 0x3, 0x8) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc5f123c123f319bd070") sendmmsg(r0, &(0x7f0000001480)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001100)="04", 0x1}], 0x1}}], 0x1, 0x0) close(r0) 04:36:10 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb0", 0x83, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:10 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f7f746d6f64653d30303030303030303230303030303030293034303030302c757365725f69643d68d657d1d510e81eeed44531fadf63d78be1de558bce1f2d0f8cf7e0d7a8f4c1f2de1182a94e706d795c84cd21d1e83f6bad1d5cbd40894972df3eee3091f0f5f247f93898bedb1d0f061a2c7f233a3bf6e1532f0019e66eb62c403bfbad26", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:10 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x800, @local, 0x6}, 0x1c) write$nbd(r0, &(0x7f0000000400)={0x67446698, 0x1, 0x3, 0x3, 0x1, "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"}, 0x1010) 04:36:10 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) flock(r0, 0x1) 04:36:10 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000240)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/135, 0x87}], 0x1}, 0x40000102) accept4$packet(0xffffffffffffff9c, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14, 0x800) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@mcast2, 0x41, r1}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r2, &(0x7f00000000c0)={0x18}, 0x18) 04:36:10 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:36:10 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)={'stack ', '^\x00'}, 0x8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:13 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:13 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:36:13 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:13 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x3, 0x0) write$P9_RSYMLINK(r1, &(0x7f00000001c0)={0x14, 0x11, 0x2, {0xe0, 0x3, 0x1}}, 0x14) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6632de551b98ec95b00cb2d819af47baf5aec348953ca0e68587a9b3a9bf8d3b96d4488581db8de3ff8a2201f17a37929e5e3d3c449bc9bbc63b298f5241aa8c32b7338b9046862a2b886f31d022e2bcd29172cd1115a47682af5ff92a4e88d30b45eba2388ee74a4eadb061d7c26561d1970c0a3122f38216f029648e9b2b42de334b9cf283101aaeb6a1af9ae156", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75935f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) chmod(&(0x7f0000000080)='./file0\x00', 0x3) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000100)="893d60053b0b4cf6cb49f8fcb3e008b4f5f680608d5cbb58cc8b666edd282a31bf4976afe054c029f70d5329894a013400312b1e26acd1fab5e67d230487d4d8b75bba7f6234184e") write$P9_RUNLINKAT(r1, &(0x7f0000000240)={0x7, 0x4d, 0x1}, 0x7) 04:36:13 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x40, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000100)={0x4}) 04:36:13 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6", 0x8c, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:13 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x6, 0x3, 0x8}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, r1, 0x420, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xa0}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x3}}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x94}, 0x1, 0x0, 0x0, 0x80}, 0x4000080) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:36:13 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x12) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80180) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000100)=""/77) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:13 executing program 2: 04:36:13 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) timer_create(0x7, &(0x7f0000000180)={0x0, 0x32, 0x6, @thr={&(0x7f0000000000)="abe66afe4668247628c47c683694078b137eb12394fa325fb3fd63b29ebe642654adc236edbf271b6875a038226056dda6bb73682bda8193286f1e4b4d5669782eeaccd83fd923cbcbbec2fd0685c1d1431c4d8ca08db3f80fc86a56837af07543f627439262d25b89c8e12ea5487197819c06587550a061ba2c00b380686f4c36edfc00ba55a37ccb0c065a020d329bd0940e581f7eac394cd128cc1724ddfc51a8b794851c02fd7cc138ca5d096ca9fd36e22b6b3b14f0288fcc2e750753704e59ebdcfae05a1c3e80fed67995792deaa0330eb7da154c8f1c22aba83844ec779d056aaacd470af579447f9d5b459db3bd9d4fe32b", &(0x7f0000000100)="ef59801a4aa7dea88cfbbf5cc05877b1340696a7747933b8f8cae8205b5862c9e9c9f789db319058ff6e5d81fad68e84407639109813806c57d3c9b3d15a9b0220a078e4795dbee25dd6cacde3fb4864e75395c2b0e872a10ab5f44ddcbba1"}}, &(0x7f0000000200)=0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000300), 0x4) fcntl$setpipe(r0, 0x407, 0x1) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) timer_settime(r1, 0x1, &(0x7f0000000280)={{r2, r3+30000000}}, &(0x7f00000002c0)) 04:36:13 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$inet(0x2, 0xa, 0x81) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000040)={{0x2, 0x4e22, @remote}, {0x306, @local}, 0x48, {0x2, 0x4e20, @remote}, 'nlmon0\x00'}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0xe2e4, 0x20000ffd}) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYPTR], 0x8) ioctl$FS_IOC_FSSETXATTR(r1, 0xc020660b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x980000}) 04:36:16 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:16 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYRES16=r0], 0xffffff10) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 04:36:16 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) 04:36:16 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000180)='selinuxuser@\x00', &(0x7f00000001c0)=')\x00', &(0x7f0000000240)='/dev/fuse\x00', &(0x7f0000000280)='group_id', &(0x7f00000002c0)='fd'], &(0x7f0000000500)=[&(0x7f0000000380)='fd', &(0x7f00000003c0)='/dev/fuse\x00', &(0x7f0000000480)='fuse\x00', &(0x7f00000004c0)='\x00']) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x10000, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={0x0, @dev, @local}, &(0x7f0000000100)=0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000000c0)={0x18}, 0x18) 04:36:16 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6", 0x8c, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:16 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in=@initdev, @in6=@initdev}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000040)=0xe8) 04:36:16 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000040)=0x1e) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:36:16 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket(0x5, 0x80a, 0x2) bind$inet6(r1, &(0x7f0000000700)={0xa, 0x4e21, 0x3, @mcast2, 0x8}, 0x1c) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000380), &(0x7f00000003c0)=0x4) chdir(&(0x7f0000000740)='./file0\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r3, &(0x7f00000002c0)={&(0x7f0000000040)=@rc={0x1f, {0x4, 0x2, 0x0, 0x7, 0xfffffffffffffff9, 0x3}, 0x3}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000100)="eddee5fe146c9da9e598f0fdca8e4a32be0bedbffee2a3a8b2894feddcb68f97d97608d698a89d1dc373ad3877b779bcdfb9e242f69602de19992144b37cb883c257a3433f73339c5ac0919588888abbbfe9ada4cabb845e34702bf84af1e48708fd32e05f5fafeaf00dd07edd76e916f52a982914f9454395361694c18cb3bdddb0145405caed759c6be69ec11c45847d8f9042322afbae516f552ef9fc6d687ad8f6812e04a0d4adae1ab825fa5acb75c27d3b9cb2d285f5beadcc323649dcc04d40163ad3d803e96b2969fe8f6d059c3f7f8408a7d6", 0xd7}, {&(0x7f0000000480)="3028c6bfa1d87b9fc4a766d89ba3470f41ddf2536214db0c1da02826bc0b174a2f3c9bbb4e03742aeecc217ba105d954946aa835dec05903cf0e63a307c9ebc3cc3b99bd125b4d6dc28f6f98c3fa06e89379c038028cdf6da817491c77012f5b72340420849886827da3732b33b1072104a2619b53bbc58ce4afd0e72f062ecc8da3aa2dfe0c6b1ee2543c2678426329502ea8da1665995e344d21c2ca560bc217aacf6e24e3afc0714ed732e8e65787c00902421b0a2ff5d161dbd12af720b3d06aa1a80377d667dbe9", 0xca}, {&(0x7f0000000240)="71fbe21bc8f8cd433e2c1655d846b863", 0x10}], 0x3, &(0x7f0000000580)=[{0x58, 0x29, 0x101, "a0ae527e2be7c9185241099f5fe23d05c8285446e81deb818620931be4b891299677261575c78fb82c8fdcffbaeeb927ff955f4b718d191db1174c786761157cff593222a8db7f00"}, {0x60, 0x0, 0x5, "1c87ae67c440d923af1c4d63d4e447419696b578c0d016370f22cdb3280ef85bac46ac9d54bcb04ca5dcd95db3a485cc60b6ec8054f5f3204a5fd9a141218213a3b7ae65bf085e2f734099aa8af81c6d"}, {0x28, 0x117, 0x0, "58dee136e0cf2acbb2162de53772f0dca135ccf6bedf8dca"}, {0x78, 0x103, 0x0, "e5da10017f79cc7386bbc6de62d33911d50e6e84b8b14859f22b64c260830ca5a517d644e126da66badc554b3c5ef7b437f6a2543e4d96d286fd04e388afbd5eae8de3438994bfa956cb101ebab4b3e807f23dc4c02d87de08c60b9d23ab26eabb2445c8966ba4"}], 0x158}, 0x4) 04:36:16 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:36:16 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000000)=""/192) 04:36:16 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r2, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4004}, 0x4000000) 04:36:19 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:19 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0xb6) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000000)) 04:36:19 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:19 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030300200000000000000d766e7c430303030303030303034303030302c75731a357693188c1822841b2e0ed9768b6a468309f804159d514555f387f137cfe143d849cc1d59396e32558241d142eeaa71ac1877024dae1655f86640abe0b3a3f9fd949196743bcb499ec2ec71d640148b158eba31ea5d78919728870b3de205fe95b962cb9540aac040345f119c8a970ace83d521f8525b03763da001d6942059aaec9e76a10379d8998c61f7546cf21919e6d9813b9bef0fc3524af0da", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:19 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6", 0x8c, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:19 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x43) socket(0xa, 0x7, 0xc9e6) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0x6, 0x1, 0xc6, 0x1fd, 0x7f}, 0xc) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:36:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB='\v'], 0x1) ioctl(0xffffffffffffffff, 0x8936, 0x0) 04:36:19 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) 04:36:19 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) write$FUSE_STATFS(r0, &(0x7f0000000000)={0x60, 0xffffffffffffffda, 0x1, {{0x3, 0x1ff, 0xffff, 0x4, 0xa6, 0x3, 0x6, 0x80000000}}}, 0x60) 04:36:19 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x480800, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000000c0)={0x18}, 0x18) 04:36:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) socket$key(0xf, 0x3, 0x2) close(r0) 04:36:19 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000000)={0x1, 0x9, [@empty, @random="dc51208a2cc0", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random="3bf171ba4ba4", @link_local, @broadcast, @broadcast, @link_local, @empty]}) 04:36:22 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:22 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$P9_RLCREATE(r0, &(0x7f0000000080)={0x18, 0xf, 0x1, {{0x1, 0x2, 0x6}, 0x3}}, 0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 04:36:22 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:22 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000280)=0x2, 0x4) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042dbd7000fedbdf251300000008000400040007003c000100380004001400010002004e20ffffffff0000000000000000200002000a0028ddbd05fb814e240000005ff8ffffffffffffff0000000000ff000101000080"], 0x58}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) getdents64(r0, &(0x7f0000000080)=""/53, 0x35) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000040)) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000300)={0x3, &(0x7f00000002c0)=[{0x80000000, 0x100000001}, {0xfffffffffffffe00, 0xffffffffffffff1c}, {0x15da, 0xffffffffffffff80}]}) read(r0, &(0x7f0000000000)=""/9, 0x9) 04:36:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x18}, 0x0) 04:36:22 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62", 0x91, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:22 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x3) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000240)={{0xffffffffffffffff, 0x1, 0x8, 0x2, 0x7}, 0x5158, 0x5, 0xffffffff}) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f00000002c0)=0xe8) getresgid(&(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0}, &(0x7f00000005c0)=0xc) write$P9_RSTATu(r1, &(0x7f0000000600)={0x82, 0x7d, 0x1, {{0x0, 0x60, 0xffffffffffff0001, 0xbd, {0x4, 0x0, 0x3}, 0x40000000, 0x82, 0x6, 0x80000000, 0x9, 'selinux(^', 0xa, '/dev/fuse\x00', 0x8, 'group_id', 0x12, 'nodeveth1vboxnet1.'}, 0xd, '@vmnet0[wlan0', r2, r3, r4}}, 0x82) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r5, &(0x7f0000000080)=[{&(0x7f0000000100)=""/191, 0xbf}, {&(0x7f0000000040)=""/42, 0x2a}], 0x2) write$FUSE_NOTIFY_POLL(r5, &(0x7f00000000c0)={0x18}, 0x18) 04:36:22 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="ef5f3d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getpeername$unix(r1, &(0x7f0000000100), &(0x7f0000000180)=0x6e) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) rmdir(&(0x7f0000000040)='./file0\x00') 04:36:22 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 04:36:22 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) 04:36:22 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000000)) 04:36:22 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f00000003c0)=@v2={0x2000000, [{0x9, 0x4}, {0x800, 0xfffffffffffffffe}]}, 0x14, 0x2) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000001c0)={0x18, 0x1, 0x0, {0xc7}}, 0x18) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/if_inet6\x00') write$selinux_create(r1, &(0x7f0000000280)=@access={'system_u:object_r:system_dbusd_var_lib_t:s0', 0x20, '/sbin/dhclient', 0x20, 0xc000000000000}, 0x50) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x93, 0x5, 0x9, "36977a1df4fbfbbabb78d0c6cafdf43d", "965695efb2c508e864b4727c8cbaafe23e5b705729727eaabc075ac0bad2c512cc303608c7268c8d985815a81c588858417248efeebd867436fb6d602fb12a993634bc52c374be8d609f76d7563794fd841061e4cbf9768d337d77d0e4094b54d305a32b43b41a0526cc361de60ad5c97978e64b6c64ec3e62214c4a5c1a"}, 0x93, 0x2) 04:36:25 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:25 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) fallocate(r0, 0x1, 0x5, 0x5) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:36:25 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:25 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62", 0x91, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:25 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x4) r1 = dup2(r0, r0) write$selinux_context(r1, &(0x7f0000000080)='system_u:object_r:memory_device_t:s0\x00', 0x25) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip6_tables_targets\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00') dup3(r0, r2, 0x0) 04:36:25 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x33, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x3, 'ovf\x00', 0x20, 0x2, 0x51}, 0x2c) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYRESDEC], 0x14) 04:36:25 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:25 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000300)='hwsim0\x00', 0x10) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)=""/34, 0x22}, {&(0x7f00000000c0)=""/149, 0x95}, {&(0x7f0000000200)=""/252, 0xfc}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x4, &(0x7f0000000300)}, 0x10063) 04:36:25 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0xa, &(0x7f0000000180)=[0xee01, 0x0, 0x0, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18}, 0x18) 04:36:25 executing program 2: 04:36:25 executing program 2: 04:36:25 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@rand_addr="3104d173275ba072c4887816cfeec4c6", 0x9, r1}) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x100) 04:36:25 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:28 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:28 executing program 2: 04:36:28 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x140) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000280)='net/ip6_tables_names\x00') setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080)=0x100000000, 0x4) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:auth_cache_t:s0\x00', 0x22, 0x1) write$FUSE_NOTIFY_POLL(r2, &(0x7f00000000c0)={0x18}, 0x18) 04:36:28 executing program 0: setresuid(0x0, 0xee01, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x202800, 0x48) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000080)=[0x2, 0x4]) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$chown(0x4, r1, 0x0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:36:28 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62", 0x91, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:28 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:28 executing program 2: 04:36:28 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000015c0)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001740)={'bridge_slave_0\x00', r1}) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000080)=[0x33d6cd04, 0x3ff]) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000040)={0xbd, 0x9}) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000001780)={'ifb0\x00', 0x1800000}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x80, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r2) r4 = accept4$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x1c, 0x800) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000280)=0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000340)=0x0) sendmsg$nl_generic(r3, &(0x7f0000001580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f00000017c0)=ANY=[@ANYBLOB="60110000110020002dbd7000fddbdf251700000008007b00", @ANYRES32=r2, @ANYBLOB="8a6937507246b90feff4127968c04b8c3ccb7543d2c5c1cb4639f32ac46b61f0832b1c6b7cc9bb9aabb602251b37c72b58218b655f646b7cb1472d671af3017f647d0389b7ff2030bb2df58604d5b8cf82722da4a6a35332d6f850993dad347f32964e14c744ad55a29f2d1831c2ab8ad888e28031c1c257ae109199eab1ff4608d3ca603650ae41aabc0c2670519692a9a6172acee2fc7cf981d60b140aa6b53d91419aea34a371c7899d770c0621843790534d30d5e943ecd5667da7428e5e5fb226230b99648799e790a77404debbb3c0343196c25d5ea63e063d69e845d4b994968303874fca9a06d08376cac78b96d3494e6b257852f69b515e9df7e08aa3bd1dbba2a24e7b17f4ca84432add3d774f2ff925a7c22ce4e718661ca9fda6d141208cb46e0259b67eee6afd7cafb0891c787a645cc2519b048abea07d610f194c2cfb8d1d89a35c4abee63b9fd64c3827b8eefd014bed657790ba4fe5443a111e7df465973c7af698b03ab8dbe25ea95828e0f2bebeadad4e94117d225fe6058c3302f6f15a0e3cdb513251fe152ebdcceffd404b26a7ddaeaf70c1a1c1b0f1e4e369e08f683edccb8ea6a69667124dc6829574a712588143a7af23fa4f74833273361048b5a7f41c4db281e7bc7ed0346464d7ac42dbfc609dea3dc27d51cbcd4f41fc34217716c1e8aad3e275a27f96e96bb274d2f0cfaa4c665ed988501f90dd5258eb09ae2d3ba4a742d94ee41a3049ba79ca69ebfa28695916fbd8841e83c2f6feb236dfc8a0c5ba701b5d8c72c5feeedfc4a9315a0ddc4847dd589a85c7c1f3a1e5fc4c82f6cee17372af26efa4ebfdd5e1daddfb1d0670ada92860b670772b35b7103ae277f0f97a9b718005866250ba266282b4e9c275a619cb658ac6c3a5a9ae586963b073b048444db80790f19266626d0c566a426b26527d7aacc056a6fc617ce1d4d334b345797143221f88890c34c23f372d64cb53da169aa89bda4ada22fcb4f8ae5bd971cf8428fc66b2a4f7d2a064b785b63763802dc5529b949bb486edec9809860e3bd35426f8e3f71e24f9b11bf8edcdfdb57997b333c031d4a055e69a796d21596d805ebfe072de0e27422ff68494b84be9d138ad9740545453dd5102d38acfde5df4b78b4553b558b85c10dc1dcedd2ea3b6f01721084902762f8f43382a9053130f69ee6dce152c191938f3e8d3556cd853fc52e40d608ea0245cf1d1c5a24a9a8be6a0afe6699dd3f8e4f522fade0da2784243c2261316bebc7f1900a253c0f156c95582024127026cfff46eee6e142daa546704338b7fb0f005ca5614517d0bfc9fb6a165af53a8484ee258658e84988ab38362a013ee2049aeb8d8e8681da73639c0f3d17ccd0899cfaa028dbfd8fbd1b589b42f69a99652e1dd4008b7073679afeb914198d5e7db2ecb9b477947b0fc83450adb4cd8ae8d388de6869373931d8be579b655a57bb2ad67dd211c4553bcf4e1f153a8ee57dde92312d1463933a55009e1fca42c0196b94e6370740ca0da4683599595b28ddad3279e0679b01119586fae0b74fb76491f5eed8491ef2d9b5f897f4b206e1822c8662e8d7a9746273817832dc7da58090f56193a1eb8467310052372dd675009d8ac95e7b44e29ff05b409c115f2db67edd926ddea9b9e49f04f1c43f6e30dfeb981ea3ccfe186ddd0440cef3161608acd00e75d84ff27345d56261990e50bb983305a495e09200a0bb90ac4f0cd1483cb62a29a5d0e36729cc486b677257b6103325a763d081d4989bd19a6c2cf0c045e37488274dd5ab4f35babe7e8953763bc039fcffbbfc12240a6649365590c70cc70bb4b52e74ea9b83481540030c77766a61639fb8d15d7e5f048a4f8a0c1f741a1a9c809aaba616ba2a4769759b2ef825258ea7fb0dff4013f6650b3b9ab3ef5cc146b032f2aa8cc8c2fdfdf14515de399cb0fddfe6f8b5a40fb5d5a48b047194cfae7d964687fd5cf57d7821bb8aa0ce2e0e9187cadfdff5659d9cb95c461e5f67b73165805191626bd52c38b216aaa2604b731feab07385e1d327010fd45f1a1543fa9a835832fb5516c7ed185bc7c9fc689a81f8a0ed40d3c8fb763deefaea62b38570081624ecee01ddbaf8a939ccc05f65b4f6400c81ec6c8de79927a557120c88a6bb271b18ef0a52573c011ceb54b990080dafa6a95c05b3b90dd854615682e54934974a5a346788186a2bb29a4582369f91d876aab05fd2208c997216933d511f65eca619920b14e8ff2a2d481aa60d03f24694cfce33d4c7e34e1bb1d9ad1322fad633a0c1bb3296146e4ccdc53a8df974cb68e464285855bc7fec4c1bae75531bb636d4c94a44cb1269a6b2b1e41210c0ab888b7cbfc0383b171f96f5355f6b957f48058ebef8b5870978984fcf42427715e89c432324e3ad540c898aa96a65e990b91b8a93ea08832c5ab202ecfd7f0cf6d9ab2e21846d6da941295dae542ee929b14f87f19f7076db69b448de08781ff8617578ff50fb617786dc3aaf092f9995450e462bdabec774cfb3faef0aa114883b5bd7e210685fd8e12b612d09828b4385090ae5141464961b6a05fc637749e542eaf68374596096e1ecc3fb631a06cb94bf0627c239d6accc97cdf71de2e40e8877b40e3815a9351d91c041f3e2af317c5f8e4cbd283e2f1e45bed9590f351ee099fa0800d36d213548728a6902d4104ea0f9b42b54dd22ea4dafab6756a09a054b6f08d440da8673c14f427ebdb6d755b2d2d6356b67334c4515ad306d5ae5933e6a99fa9369766649eef00234fd03eeab8a411479f97b8da94a8889516eaf44b8c16048750d04b12a6070833406fa43df28a6434ff81e677f37ff361f0eb92f16dd14bafbb6852ac17b7a4388c9b16add4aa53813120c29e727bdbee3d01d2b26d17d3cda83169ee507f5798df9478380729fcf38b42792ed840bbef223689468d2066b51f35f707e1d9b6c7b8d6ec230ecc44e6d029a63b23c29a0696a134d812b941f6b518bf3eea446add91a0f17678206656426b620625b5059f19255dac85531f5cb00929064d894129da68f79250172106b0f1fbb7acab919fadb5abb0f00cbd4b7fe4f497d8b00cacd4346a3a75673e1c37b07ce9e675c5661045b9723e6a7ae28b972e515e238c02b439e9654e9ad201ef1b6343b746ce9770055e842c3e296c0e9e5c7a957cfdb950795840e03162b5adeb3c7730e728143ef9f75c09ee8de8e5717b56cb4975acb9e46ceadd5d5ca32053f1d7a80bdcccaaea24dbdf07f88d5672e95a4908213a8849928a5cacb75c006ddd891d205647674c2e2b1b2070d3cd20550f08bd83a981bd4a82c6a7176d22d5d13b95c16038c73fed44b203dcfafd489769e61455949feaf1193bd0642d6e0214ffecdaee7b261456aef59a26ec53d07e1819f54d2d545175ee5bd69466a511c0ca6614c0b5c72f96a7fa875db8101e0fc8f763dd320c67019c126d305bb54cae7077498f3bedbcbce67b59e998b0888a99ee05b3f05a270ab1560a3dfec57c7c893ff3b38054a2428806cea708d4036feb6b5dd6fbd874ef6e1f6ff3763f3c4337754bf167c3f1ce0e316d76705e1527506c57d30481b354258a6c45435b1935ccb09e4f4b5b121752947d06933b86b88fc6a92f2b9ce8d4dd7ff14e97250f4c7d02d19d38257c941fa16033082d4c808391255396b60c8920b580546f54b498498efb1f739514afb8531157d3d67581e8f339faecd3ddecc2ee06840e1bbfe709e5c1029296729d5f300e9e0d5fd7f0657e4472cd0f9f4d5dd8f18db22ecdfe5759d4e57063dd98020ec28bb39b9d19a2a31ddb798cb452a4733e6e2de1b65a338a916973d3414014555463e673758a98b5e12620dbde333506e1af2b04128faf4ef4a5cd15b7d48f057666ed07ee83c912811d8ee94c3492a027d557fad0bb1c97fdfd84b18425df7bdcba735a34d41be881f8c69c2e2c4376708aae20daff0dc632bee34a3b25928f044ed0db8a6b94ef3da10484447866ed667ef6ae9fc96fd694409f30fb6c011ba85d5c358189e1faff8beeb17dbd75510415e0f369c4b06bba39918fae68920f43683ae0cf0b639203a8d85701fe8c15b0b57727c74c2af4cf06a4d7f7b9cbc9e694da81051a301107fc8bdb28fdf90be86a9f7b3d610d85d58bda1a3dca687d49c45bd283dc0714dc7d672eae5f5eaa262fad896dd9ae640355a2b879f805a850396c7679204048e026085ec45b7be4ba81d1e888747773a45c4d34318c28d02dcd03fc832ba8a59c21f91e8ba5306699dc0cffc8b8eaddd336e4bd80f32f1afddfe5760a98b27f743009ecb220384cab3770c008a54c6577bce5825814a79c5f083b36aa74ed137a22180b54ed7c9dcc02134d5713ab88a3bef6a6c6cc7e35946f52f91e8b35ccad90191420698c700f1e9d9978b9fe2deb674fdf808ceee2c77474f51aba31083ebebb45e4d3f2ff5486c454169cbc02e24e03ea6f5492091c44f0fedf5712d324fba38cacd438bc177eb9e9cd831d02af3f210770489e5a3ff097ebfbc0f332d96c42e7a45d80e8d2b819106acc6b033450137bde66b36f01f905230b56cce85ef02880a43ce70b2c5e552c5d8205024a72bc7bfb238b8a83c7e1a9d9edf3bbe6716bec828f651a5edffbd1fada857c8a0d85d7b68eb4f2f24d78a9186a5b07b94cc3991024676e892bc19bd03d2343e8e8034b2cc6768cb091abe54aa15a2d8c9798c3b68e1b894c8b0d4dc55ac2e1b84737d0e0e4f2f203ba0a01d121262ca531a842db596ca60aeb6922b43a2233c931419d3affe5682b8279d26e94a18025b1037d0cc4025e6d75954ef5288063c62109f76b7663f74d25614fbfaa8cfaa3e6d34763d541f98812f38fc84e2ea714c42b9ef9aeefe01a74b33b73af7d1d8e9df19fc4e599a2701fe301b0ab2bad6c6bfcf14f376cc3510c99e91bce5f6eab0ca714796a7c64247821cd6f354b9cef03c820397005ce9f07e05b478e940cfed64ee578f52e74f522431e0ae672c847c18ca9b6ea0caedfb9b27fad01ef62faf13c33371538da22a0d7e583c7ce5f5c5b043c9215ccb7a8f5a23bbb1185036af146c7a6a8ab300e817a3359c215fe8ad9ccc950df5e4856508790796e005f03b266c376104b8cce10b9d3babbfff9638aef28360a746a86ef6173bb66b99763d31ef4be724c90a09b438277baf9183c0a345c91b4616267a8ac3fc2e23cfa85df2d5deae71430fa6172b9626b322fb89a8d9a13e10ad569db0b111afd1bdb382ed84c08851efeffb80d2cf472dc6984dd7d712cb3c86117e415febbe1b46a6c27b0e0c54236c14a1660b086d7d042bdaff716690c7498a91576002582096f98929075f4712c1c4c59f1adde6491444b20ddbf2d164f6e648c0e3edffd194b3489a8300737d3df66f9ca1d4c180523b20d6c1a9aeb8439d328c3e23c4fb02d5085dba9787920f916fe2200bec113d076266c42eb32322ef8ef2a53204c7dfb70f6c54e59b5f9bc285221826affea8a6d88891d512a033dda46b9d23d15c3b8462623ff4c9d79fd95488b32b1deaaa17f671e4aba34fffc224c808d23d2e885b0d4cdebeaad3daded74f6719a85c4f542bdaf0d42d6d917ea056344da8997d86160dd68f4808714c1d3fec04b3c31e50d79cb134bedee4a81798a7bc095f2011b875a89352e1136d6ac320b273c447b8c751e1b56293a84e6ac65205a12d1742891f65aecaa06fdaa9ca43e4f53291e33c4308923e45247910094645d5b811fe13cc0a2a5c7b9bf44012c00f86773fa24eb00e3e6ecac87b0305922e685164fa9b2f5f5331787ec9f3018a5151a7e48c000f659698e52cd12a6c40be4371aa627513b0e35399315c4bcfd9f7c386663d976dbd2cf845961e57ca9bcc032890425ddb12c3c990c751f134b63b615195521f33883464437e11592c62ec4f266640d7e9c7fda50390800300094a0db66521fd41e3f5e03d93ace997c447fedd5f4867bb25878880ac616d9dd824439489d40", @ANYRES32=r5, @ANYBLOB="08007c00232d000004001c0024005d002f73656c696e75782f636f6d6d69745f70656e64696e675f626f6f6c7300000008008300", @ANYRES32=r6, @ANYBLOB="0800850020000000614c0c10390f42e352ff9e2c89d73ac406fd5eaeec566e28d0a3a446499f9e7517ad6710413a9d35443b4cb069be5f28708bf3faaff9be28f61bb521f68531c18d9a87469b9419f1a437cd20971933848439fb87880ab45f79ed3353df494e652da6b30c45cad241f91fe8897d13f3e9c356ab08005900", @ANYRES32=r7, @ANYBLOB='\x00\x00'], 0x1160}, 0x1, 0x0, 0x0, 0x4000}, 0x440d0) 04:36:28 executing program 2: clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0xf) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60b00900001433ffffff7f000000000000000200000000000000000000000000000000000000000188009036c13cec0060b680fa0000000000000000000000000000ffffffffffff00000000000000000000ffffac14ffbb"], 0x0) 04:36:28 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) epoll_create(0x8000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000100)={0x18, 0xfffffffffffffff5, 0x2, {0x9}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="e20000007cad0278e03f0000e64e00", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:28 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$get_persistent(0x16, r1, r2) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) setsockopt$inet6_buf(r0, 0x29, 0x7f, &(0x7f0000000000)="1f5c27fd8c65cb8a1aed1fc93cdf8e58e8e31b67a4fe7dd6", 0x18) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x4e24, @multicast2}, {0x306, @random="c95d951aad30"}, 0x2, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'bridge0\x00'}) 04:36:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000001) 04:36:31 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000), 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:31 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x23) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001340)=ANY=[@ANYBLOB="0000020000", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f645f3d5130304c303030303030303030303030303034304230302cb1a453b05f696489548be3dc3d5f8c79984799390171d8862d5100eb9e3f8afed36c571e99b1855e8ffec4d17f72073ede3b95b37754b67ac18913fc1beab48081136e7e833604f3822fcf53be15eb2ee43419e5356e9d1a60bf736edfa4fe5ec8cf4a35abe9b8e4ebc8bb19e196bae10b8d0349f4d9eb14dbe05f8e09d118a3919dea1aeb2d36d6d4d144925bffc4e028881fb6586c76f814c40e648a9156e9669cd87a26cfca7bdf6c7224bdd0ba56b208b448c299aa3c8e9b4d621134033b93b520305559ab9fb6b774ac6e080d692bb3c25a6f7a1c729a8cfe04da4fc46f6cff65d149de344b", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) prctl$PR_CAPBSET_READ(0x17, 0x13) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x28a}, 0x18) socketpair(0x0, 0x800, 0x80, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000340)=""/4096, &(0x7f00000001c0)=0x1000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000240)=r3) splice(r2, &(0x7f0000000040), r2, &(0x7f0000000080), 0x6, 0x6) 04:36:31 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) fsync(r0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e20, 0x200, @empty, 0x1}, {0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0x1d}, 0x4}, 0x6, [0x1000, 0x4bc1, 0x4, 0xffffffff, 0x8, 0x8, 0x7, 0xfff]}, 0xfffffffffffffef6) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYRESDEC], 0xffffffffffffff98) 04:36:31 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/ptmx\x00', 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 04:36:31 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb61", 0x93, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:31 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x0, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000800000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 04:36:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000180)='map_files\x00') fchdir(r2) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) connect$netlink(r2, &(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x4800001}, 0xc) r4 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="1fe5a2b9b599d6dea1c4431bf41f9dc35e89cde6fe1a2c6be68c55f50c100507b04de72bef9d33a181dfc8bca8014511f8117d1385df576cae530fa30070bdf3d9d60447e4a38bbf629caf1e2d95498284aa5a5d6e88950a5f6c9c03722e70f11adef238d122392244948e237f8fbb2dfb676f8de8f9c1a599cac9", 0x7b, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000380)={r4, 0xfffffffffffffffc, 0x20}, &(0x7f0000000400)={'enc=', 'raw', ' hash=', {'xcbc-aes-neon\x00'}}, &(0x7f0000000480)="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", &(0x7f0000001480)=""/80) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:36:31 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={@local, 0x3b, r1}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r2, &(0x7f00000000c0)={0x18}, 0x18) 04:36:31 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000040)={0x8, 0x0, {0x57, 0xe013, 0x3, {0x3, 0x3}, {0x102000001, 0x4}, @cond=[{0x7f, 0x7, 0x2, 0x7, 0xf82a, 0x5}, {0x5d, 0x1000, 0x9, 0x9cd, 0x2, 0x7b521d6b}]}, {0x51, 0x9, 0xf077, {0x81}, {0xb, 0x2000000000000003}, @ramp={0x0, 0x8, {0x401, 0x5a, 0xcea, 0x3}}}}) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYRESDEC], 0xa5) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x200, 0x4) ioctl(r0, 0xffffffffffffffff, &(0x7f0000000180)="cb1f159957f618a30dc4caf1eadf519da303908ead943d05744f81c0200f1235d5a930b9269662a860dd1a6f1e2d1bfe0f8d90ff0ae2ca33eaa545ffc2b6981dac58a9fee5") 04:36:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="5500000018007f0212fe01b2a4a280930a06000000a84306910500000b000f0035020000060000001900154004000001d40000dc1338d54400009b84136ef75afb83de44110016000d0004000000060cec4faba7d4", 0x55}], 0x1}, 0x0) 04:36:31 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=""/4096}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x200000, 0x0) openat$cgroup_type(r2, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001480)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000380)=0xe8) r4 = getuid() r5 = getegid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x308cafcdb38a6f72}, [{0x2, 0x0, r3}, {0x2, 0x1, r4}], {0x4, 0x1}, [{0x8, 0x4, r5}], {0x10, 0x4}, {0x20, 0x4}}, 0x3c, 0x2) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000140)=0xc) syz_open_procfs$namespace(r6, &(0x7f0000000180)='ns/pid_for_children\x00') write$FUSE_NOTIFY_POLL(r1, &(0x7f00000000c0)={0x18}, 0x18) getpid() 04:36:34 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000), 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:34 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) r2 = socket$inet(0x2, 0x0, 0x2) recvmsg(r2, &(0x7f0000000640)={&(0x7f0000000040)=@nl, 0x80, &(0x7f0000000380)=[{&(0x7f0000000100)=""/133, 0x85}, {&(0x7f0000000480)=""/237, 0xed}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f00000001c0)=""/21, 0x15}, {&(0x7f0000000340)=""/42, 0x2a}], 0x5, &(0x7f0000000580)=""/135, 0x87}, 0x141) 04:36:34 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x1f) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:36:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/ipc\x00') ioctl$FS_IOC_GETFLAGS(r1, 0xb701, 0x0) 04:36:34 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb61", 0x93, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:34 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x0, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:34 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$unix(0x1, 0x7, 0x0) connect$unix(r1, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e21}, 0x6e) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x6}, 0x18) 04:36:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4000, 0x80) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:36:34 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000100)={0x4, 0x0, {0x57, 0xe98, 0x1, {0x1}, {0xfff, 0x8}, @const={0x1, {0x3, 0xfffffffffffff801, 0x1, 0x1}}}, {0x54, 0x101, 0xd2d, {0x100000000, 0xfffffffffffffffd}, {0x7, 0x7}, @cond=[{0x2091, 0x4, 0x567, 0x2, 0x1}, {0x600000000, 0x3, 0x6, 0x6, 0x8, 0x9}]}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\n\x00']) r2 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, [], [{0x0, 0x0, 0xb9, 0x4, 0x100000001, 0x54991bca}, {0x8, 0x5, 0x5, 0xbbd6, 0xfffffffffffffffe, 0x2}]}) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000000c0)={0x18}, 0x18) 04:36:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x3cd) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000300)=0x83, 0x4) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) write$nbd(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="6744ffff0030120ffea2910000000000210000000000"], 0x1) 04:36:34 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:36:34 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400, 0xa) fgetxattr(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="00d3879aa3944a7d540b00000000007df72ab8685811ee892a2f00d3b83338e043f844d2389e21f2731b7aa81727a0a1a7c57e68b243f4245bf3fdd9cbaa357bb4e989c27d20978037b0aa3ff4daad5662832f1dc8481c168dedbc61f54ca0ae2106cf47a1ccc34b11e891b8cfef1cc54173842b32e35235cd2a9eae349dac363eddf10ca7a9cd61134ee6c3082733eac2"], &(0x7f0000000100)=""/62, 0x3e) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0555ec02514b5c067ddc4ffb7ed16f133b3eb26ba422bf53b4"]) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000140)={0xffffffc1}, 0x18) socket(0x400002, 0x4, 0x103) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1c, &(0x7f0000000180)="221b20d8e8a2e5d0fb65be94325f54c6284352bd0bbd91b10c07b78ca9e20f2b298f7633657d7ac729c223bf09d5c013bdc32c94d6890600abef294664120e0f1704d0bc1371368640e347b6bee31ffe53e9d510022c0035d914302e4faf10e7982e4984c6", 0xffffffffffffff90) 04:36:37 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x100, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="600400", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000100)={0x2f, 0x4, 0x0, {0x6, 0x55, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18}, 0x18) r2 = fcntl$getown(r1, 0x9) write$FUSE_LK(r0, &(0x7f00000000c0)={0x28, 0x0, 0x5, {{0x6, 0x1, 0x2, r2}}}, 0x28) 04:36:37 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x0, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:37 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setns(r0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:36:37 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000), 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:37 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb61", 0x93, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:37 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000000)=""/62) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x14) 04:36:37 executing program 3: mkdir(&(0x7f0000fd5ff8)='.\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000001c0)={'veth1_to_bond\x00', &(0x7f0000000240)=@ethtool_rxnfc={0x46ac22cb942ff092, 0xd, 0xfffffffffffff5d0, {0x0, @usr_ip4_spec={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xd052, 0x3, 0x1, 0x42}, {0x0, @remote, 0x1, 0x1000, [0x6, 0x2]}, @usr_ip6_spec={@mcast1, @local, 0x7fffffff, 0x200, 0x6}, {0x0, @dev={[], 0xd}, 0x4, 0x16, [0x9, 0x33]}, 0x6, 0x7fffffff}, 0x1, [0x8]}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000100)={0x4c, 0x6, 0x0, {0x4, 0x3, 0x23, 0x0, 'wlan1,posix_acl_access}]{[%bdeveth1'}}, 0x4c) socketpair(0x4, 0x3, 0x8, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) 04:36:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='mem\x00\x01y/\x06\x00\x00\x00\x00\x00\x00\x00\x16\xd4B\xab\xe3\xfarent\x00', 0x0, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x208200) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 04:36:37 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0xffffffffffffffb0, 0x1, 0x0, {0x80000000002}}, 0xfffffdeb) 04:36:37 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x48, &(0x7f000000a000)) 04:36:37 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:36:37 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="6764359d1e7c7a33b81f82e32b2e9465d86d302d483fa30ad41c35aefeb0cc3c9889b4368ac23335611442c173a5cad8d8ff6a8bd93555f9fa8163ca02a64f461cdf36af85547e1b3bd940b5aed615dd5a43af8ede8e55cf8a017e7abc0d4bf99759570c4fc44f36d71b145656a5726d6896c35e02deb74bce5f47e31ea3ddf1ce554aaf887bc9154d525bd70cb5196f4470ef5521008e7c4d6f3bdfc4b58027132c3799c65308ad2b695eb6d2f5219127b98703faedfc08dfe8b9a47490531eb10fd899b140ca9cdfb036c6722ce81901d9f455dfb006e1ef0dd1bf37dd316e6b8f30", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x20000, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10) getsockopt$inet6_buf(r1, 0x29, 0x15, &(0x7f0000000100)=""/77, &(0x7f0000000180)=0x4d) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={0x0, {0x2, 0x4e23, @local}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, 0x41, 0x0, 0x0, 0x0, 0x5, &(0x7f00000001c0)='team0\x00', 0x0, 0x0, 0x81}) 04:36:37 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x7e) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:40 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:40 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) syncfs(r0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x2, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="f7000008000000abffffff000000f1ff649e8a29b144238f9346a8a888558099e005ab9ebdd3021d7d9f94c83a4802db1bd76aad53fc68f34c441cda973713e8411c73c3f1803bf003beb120cffcebd48a763456c4aa7d7770358c67fd4d093efa5ad810a4cf403b07d9b9828b1fdc63f1fc", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$nl_route(0x10, 0x3, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='aufs\x00', 0x20, &(0x7f0000000140)='fuse\x00') 04:36:40 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0xc01812f4, &(0x7f00000002c0)={0x0, 0x2, 0x1, &(0x7f0000000400)="c2"}) 04:36:40 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613b", 0x94, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:40 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:40 executing program 0: syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x200) 04:36:40 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/policy\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000007c0)={0x101, 0x3f}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000440)=0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000008c0)={{0xa, 0x4e20, 0x78, @loopback, 0x40}, {0xa, 0x4e24, 0x2, @remote, 0x3}, 0x3, [0x40, 0x4343fe89, 0x7f, 0x0, 0x0, 0x71, 0x7d79, 0x1]}, 0x5c) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000880)='/proc/t\xe3\xa5\xc3ad-self/att\x00\x00\x00\x00\x00\x00\x00\x00\x00K\\\x8a', 0x2, 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x3c27d2db, 0x2, &(0x7f0000000240)=[{&(0x7f00000001c0)="8ed14222950be92992ebc1aceb2de2d7526a007e", 0x14, 0x1}, {&(0x7f0000000340)="cbb46800839cc9a816d2cd081be56f543dfa1649b5395b1c43f62e45798d3da2748e90acd34817c79340f2d0fac0e753459fec00db5763609999ca85c03ca683acc47e51658b6c18042ff94bcb1910eed63dacca382bc15ec09e9f732b4f65e770fc5472c3501d8bdfa05f364d79be1ac6c24c44b8db93fe5bc71361a79d24d7f5a531bcc21fb96840f4abce854fd58610d7f16d7d8d68804631d5da3cca3cf618a2a9e0d1a16b2904da10bd13e17cddf4c20cd848884ff25c55d245d29d5282185573efa4c7736aadb49d1026f15d9cd506ca9ee9fc23b5e5bdab6e1903", 0xde, 0x3}], 0x0, &(0x7f0000000600)={[{@fat=@dos1xfloppy='dos1xfloppy'}], [{@appraise_type='appraise_type=imasig'}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@uid_eq={'uid', 0x3d, r2}}, {@obj_user={'obj_user', 0x3d, '/dev/fuse\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x3c, 0x38, 0x66, 0x0, 0x7f, 0x61, 0x31, 0x31], 0x2d, [0x30, 0x65, 0x33, 0x38], 0x2d, [0x37, 0x0, 0x38, 0x33], 0x2d, [0x76, 0x3f, 0x77, 0x35], 0x2d, [0x32, 0x65, 0x61, 0x72, 0x30, 0x31, 0x36]}}}, {@uid_gt={'uid>', r4}}, {@fsmagic={'fsmagic', 0x3d, 0x3ff}}, {@euid_eq={'euid', 0x3d, r5}}, {@seclabel='seclabel'}]}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd&', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0cca3496f520b070a6a3788fd20c6772eb14609228bb4488b0c77b3eec2f9111b58dbab02f750e71bf7f2c550088b39ea4aa085e34665652e89e24e5ced5"]) r6 = accept(r3, 0x0, &(0x7f0000000800)) shutdown(r6, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000740)={0x18, 0x1, 0x0, {0x800}}, 0x18) 04:36:40 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8100, 0x0) write$ppp(r0, &(0x7f0000000100)="12a2b2ab70ca45315fe51a8c0db9e01b6ce8eede10765453bfb6871e7ea5a28d7b41db3edbb625dbd06cd08e0674c7a3928e8782b57793272205ec3c03af9a5496801b5f7477918c4ef63f2aa6b732ddc0cfa18b5495076a98b63334f4cc7416840ad2990370e68fda251dc6fcb329284bec97b9880677dbbe456ac224f69a73be9ebf75175df2c0", 0x88) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="be500f0bd9e9a834aec0d9d60c01"]) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000000c0)={0x18}, 0x18) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000980)='/dev/zero\x00', 0x100, 0x0) accept4$unix(r2, &(0x7f00000009c0), &(0x7f0000000a40)=0x6e, 0x80800) 04:36:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000180)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c208000000000000000067681b82"}, 0x38) 04:36:40 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:36:40 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x400, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000480)=""/4096, &(0x7f0000000040)=0x1000) 04:36:40 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x501e}) write$cgroup_subtree(r0, &(0x7f0000000140), 0x200004ee) 04:36:43 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:43 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grod=\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) 04:36:43 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613b", 0x94, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:43 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) 04:36:43 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ftruncate(r0, 0x6cef) msync(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',root~ode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7570f769643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x85f2035f, 0x1, 0x0, {0x7f}}, 0x18) 04:36:43 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:36:43 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2800, 0x82) ioctl$TCSETX(r0, 0x5433, &(0x7f0000000100)={0x8, 0x1f, [0xc83, 0xc285, 0xffffffff, 0x1f, 0x8000000000], 0xf0c}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x2}, 0x10) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000000c0)={0x18}, 0x18) mkdirat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x1ff) 04:36:43 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2467726f757083643bd57facec275f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:43 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="5500000018007f1412fe01b2a4a280930a06000000a84306910000000b000f003502000006f014001900154002000001d40000dc1338d54400009b84136ef75afb83de44110016000d0003000000060cec4faba7d4", 0x55}], 0x1}, 0x0) 04:36:43 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0xc01812f4, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0}) 04:36:46 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:46 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='debugfs\x00', 0x600a0, &(0x7f0000000140)=':@cgroup\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) r3 = getuid() fstat(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)='fuse\x00', 0x40c, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1c00}}, {@blksize={'blksize', 0x3d, 0x800}}], [{@subj_user={'subj_user', 0x3d, 'debugfs\x00'}}, {@dont_hash='dont_hash'}, {@uid_lt={'uid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/nullb0\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}, {@uid_eq={'uid', 0x3d, r5}}, {@subj_user={'subj_user', 0x3d, 'TIPC\x00'}}, {@obj_user={'obj_user', 0x3d, ':@cgroup\x00'}}]}}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000002c0)) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) r6 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0xb4cc7a9aca68823f) write$UHID_SET_REPORT_REPLY(r6, &(0x7f00000001c0)={0xe, 0x2, 0x4, 0x276, 0xf0, "2154bcff2b33de9106ea92a026f29570f3ed3731603e37017f714713e2148446bcebf28c2b109da5d438d90c1bfb891cf227b72c30bc3074609406ebbfd00142fd0f7dadd46f765612d2682d222cb502bd7f0c5e5c8483d079e86c0b41cc1df74eea713569ff58bf0a7d70106753122ea172fdc337a0f9955b83bdc0c056ea8f81b92e4a7e9d752b84c2716c917738b28851c7568940c2fff9d981ffa2f43f9afd9dc069e6f992ae7a72dacf5142a9a697a4a2869b014b5a568ba592e25409165a13dd8e7804deaa6235027a56bd7312c616ea8ce1ed5c519841574a7a8bb887357885224f1f7e6a957ccd737add6e10"}, 0xfc) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r6, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, r7, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x101}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x88a80160e8bf0521) 04:36:46 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613b", 0x94, 0x8880, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:46 executing program 0: 04:36:46 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x6, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x7, &(0x7f0000000200)={'filter\x00', 0x4}, 0x68) 04:36:46 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x100) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x111000, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0, 0x0}, &(0x7f0000000840)=0xc) r5 = fcntl$getown(r0, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000880)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000980)=0xe8) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = gettid() lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, 0xffffffffffffff9c, 0x0, 0x7, &(0x7f0000000bc0)='user_id'}, 0x30) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000001040)={0x3, 0xffff, 0x7, 0x5, 0x5, [{0x0, 0x2, 0xfff, 0x0, 0x0, 0x800}, {0x2, 0x9, 0x0, 0x0, 0x0, 0x400}, {0x7f, 0x1, 0x8, 0x0, 0x0, 0x402}, {0x3, 0x200, 0xffffffffffffffe0, 0x0, 0x0, 0x8}, {0x100, 0x5, 0x8, 0x0, 0x0, 0x744d246fb3027a75}]}) getresgid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)=0x0) sendmsg$unix(r1, &(0x7f0000000f00)={&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000700)=[{&(0x7f0000000480)="89f62015137900344275ad87bd7ceda0a21303b6e188afab641d2e244e1993fccdeec5cb66738cc392a3457285e3b638d9fd03e7e9de1562166fd11f68bd3474dde34a1cffec8eeca2622981ab54ddc666d08a86017966e54e5110a66f564292c9ad2e6b6f80d30b16903dbc9d1ac4c121e491f537030ec7d36f44cd88ec4a63816eb6b1d8eed000dd2bc5fbd1fc46a14f3de309868bb309210dd3b825a37c551b4ef3b821ec804acdc1010d09a2cd2c8bdd8bd81908195feec1498bf284be4df9ab59dd5e45800370c22cd6bcbc3357aa2e8110f735ed5934889821d4ff13e6070d470be4b2f765a392c0f755de1c2d", 0xf0}, {&(0x7f0000000180)="db19bd4493805c4b915fce8478766025bbaa1ca2d3988bb3a388dd2c44ce335955188dcfbda8543bc3714a5edbfdf4ab450e2c033b64ec52a6aa7069b27a38844299d9ed6931a2fe07a5024ea4f495e7a0874eaf1005a7e7b543", 0x5a}, {&(0x7f0000000240)="1f546a5a1b41db8d92496cae29235417619a59622b839d52d68c8f1f1c5c993d0f28cef824898f4f30cf63dd4e748a90ea6e6d45509781892b66f67a21a47598baab7ec612272841080a1a1aac64838526ebadbc4979449526da46f89a79352804157660a8187ecaca9e6c8fa7ba250dea483c82cbe4516bb1959308a59ad5b8a3167d5bee8e22", 0x87}, {&(0x7f0000000340)="167b49ee951a28e24cdea1d4a0f9706ea1dd41a5979161d7c2274a6162c119c62a2c5b83123aafb6bd518d2499d83b99500c190ccd9a76d000ab7b57a2d57fb519255842122f411cb921b1fa89a5ce7861e44c188e6c292f575e9a7f", 0x5c}, {&(0x7f0000000580)="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", 0xfe}, {&(0x7f0000000680)="9a36e360ff9679703b3b1091e5338dbeb5d5a6f90c94e4edbe8f2f797e32ff68b1be147694a4b49ae0448e03da75b11d38d91395c78a52d694830aa3d91e723e03427389f2c0ebd6a95f66ee1692eec2ab5c4ea262d39faf178e0e591a7fc4f17de8ec0fa9a1f9", 0x67}], 0x6, &(0x7f0000000dc0)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}], 0x130, 0x4000}, 0x880) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000fc0)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000f40)="0419631dc693e8efe382f9e19490161c4ce6eb5a77136432fe34ac31e5e53a0cccadbaccefd5eafe7960d67139d1548f4d6b4f46f11cd89855bd92bfcaa6a8a5ac2a978b530bb6e6f5069f5cd51230a7dbdabd04bdc822d37c903ca4c89577198e77e46a6643b4fee5ab40d03b1d02", 0x6f, r0}, 0x68) 04:36:46 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:36:46 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) delete_module(&(0x7f0000000100)='rootmode', 0x800) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',@']) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400, 0x0) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000080)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x498, 0x6, 0x9, 0x7, 0x7c25}, 0x14) 04:36:46 executing program 0: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="73656369726974790900000000000000efffff7f0000010000000000000000000e9affff9b0008a159dc75d0a4d5000000001200280113d63101"], 0x1) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000600)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x35) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:36:46 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',Troup\x00kd=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:46 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x6, &(0x7f0000000140)=[{0x3f, 0xc1, 0x2348400}, {0x7fffffff, 0x9, 0x3}, {0x2, 0x5, 0x0, 0x6}, {0x2, 0xe65, 0x10000, 0x100000001}, {0x308, 0x7f, 0x7b, 0x7f}, {0x3ff, 0x6, 0x99, 0x7}]}) dup2(r0, r0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000080)=0x10) 04:36:46 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'bond_slave_1\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="aee01abfd37f0000000700000069000000030000001f80ead95dead7de1447d6a44434bd6e682ba4a4f406175624a5eea8db79e9b792af19739224e9d0ccdfb34f9a6f52a527425f1389794e4fa9150edd1c37eeb5170e97fcf23e04785b47a95819319b200881c3015af938f844699940403159077ea11f6f23fb3ebfa9dce8f3146eee42e1e6a94551867e4dfd2722fedbb2227a595b7ee46f6fb894a575f9dda274eed0b4252f3c0a4065ffe83e64d93c9bbd183241e999bb616cf4679d15ef9aef640000000000000007791a7e54b9d379b5cbf2b6f6c1440d4b7ac4a6ff1a9fd4de29b528fab00f5b87d005655dffddf5187752a73f04eb391dda1465783a3398ebeb077636e557968f1cfe99e9de49fb6489691db4d9724d774a79eef1b048fb8668ad681d1c97ea482c5b369d2b6d302c39fd60a78ad75d4e67d97c563cb39d44950fbe2681682d4d055f9c4bd57b3e9e8c745565eb3a6e8bff5e3e53b7bfb3f763a41eebb5b6f0f189c0eebdd36db07005e39a7917e2002f9d494ab79af80f306e325fafa85e73ff07000055895de7fee90669b4ef8a9e6d34a01611d9219414423dffdd72ad35f57036b5e1e648f7aeca5f75927965334399656cbf22c5dacd1632d10d5606e4e9b6932995a69cd836eb0eed24d0c4a140f125c44b7ca7"]}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00', r2}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:49 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:49 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x2, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643df85cb4b90fbac8c4da5d816adb41539dd64700d55ad5b07a2c667c358242718c16ad81897fa2391591ed855026e610e46f8abf553785076fe805d563747ce3a5ebd5bf8535d55f53be1e25f2f1e19c78d656e0fb326dc744abf281746e2b88ac00000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',max_read=0x0000000000000002,allow_other,blksize=0x0000000000000200,allow_other,default_permissions,blksize=0x0000000000001400,blksize=0x0000000000001c00,max_read=0x0000000000000006,\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:49 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:49 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:49 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="66caf4b59ddbc366a0e701d81e2972c761643d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:49 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:49 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:36:49 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:49 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x100) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000100)=0x9) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 04:36:49 executing program 0: r0 = gettid() fadvise64(0xffffffffffffffff, 0xfffffffffffffffe, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000040)=0x5, 0x4) socket$nl_route(0x10, 0x3, 0x0) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) tkill(r0, 0x1000000000016) 04:36:49 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x400, &(0x7f0000000240)=ANY=[]) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x13}, 0x18) setxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:inetd_child_exec_t:s0\x00', 0x28, 0x3) 04:36:49 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 612.217309] audit: type=1400 audit(1556167009.858:215): avc: denied { create } for pid=27313 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_iscsi_socket permissive=1 04:36:49 executing program 3: r0 = socket(0x5, 0x80807, 0x7) sendto$unix(r0, &(0x7f0000000380)="8e2be62f704eef2ca19f27f45450f428f2290c012652ca4f17e41ed7ffe286d4e5fa", 0x22, 0x81, &(0x7f0000001480)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c674f6f65705f69643ddd258852d2c0f2c24e8193286b3c645ca6f45537905ba67ac6ec19c1d190c80723fd12d300947290fd39719ce18660662f1004a11cce85d4780993555c6813638d9eca597a6e69fdfcd39f48d20cc2e0ae69911f093e5df6784bb6cca045389fcf85f1ba", @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) write$FUSE_NOTIFY_POLL(r2, &(0x7f00000000c0)={0x18}, 0x18) 04:36:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r1, 0x801, 0x0, 0x0, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'eth', 0x3a, 'gre0\x00'}}}}, 0x2c}}, 0x0) 04:36:50 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xc8) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r2 = accept4$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14, 0x0) ioctl$sock_proto_private(r2, 0x89e0, &(0x7f0000000480)="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") mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="c9c9"]) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000000c0)={0x18}, 0x18) 04:36:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) 04:36:50 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:52 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:52 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:36:52 executing program 3: 04:36:52 executing program 0: 04:36:52 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200"/16], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0x6d0, 0x3) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/50) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TIOCNXCL(r2, 0x540d) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r3, &(0x7f00000006c0)="814e2d3b851c1ffd7afedff111e279271a00008f312c69e5cadf5a4f600f9082874528e85967ff76b1aa728979b668fb93ccb0bde70dd72abd58959f1b8320602dd17dabda4e5c85d9a6dd7edaff6e4501641b8db23272b963cc20dd46ea32adb49665ade9294e3ef948ebd807866d4c0ad64aa944bb8d1573605b0a6a66c8a7441bb04a905e13926f7a4ab6b6139afd62eb613bf6", 0x95, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:52 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:52 executing program 0: 04:36:52 executing program 3: 04:36:52 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:52 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:52 executing program 0: 04:36:52 executing program 3: 04:36:53 executing program 0: 04:36:55 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:36:55 executing program 3: 04:36:55 executing program 0: 04:36:55 executing program 1: 04:36:55 executing program 3: 04:36:55 executing program 1: 04:36:55 executing program 3: 04:36:55 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:55 executing program 1: 04:36:55 executing program 0: 04:36:55 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:55 executing program 3: 04:36:58 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:36:58 executing program 0: 04:36:58 executing program 3: 04:36:58 executing program 1: 04:36:58 executing program 3: 04:36:58 executing program 0: 04:36:58 executing program 1: 04:36:59 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:36:59 executing program 0: 04:36:59 executing program 1: 04:36:59 executing program 3: 04:36:59 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 04:37:01 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:37:01 executing program 0: 04:37:01 executing program 3: 04:37:01 executing program 1: 04:37:01 executing program 3: 04:37:01 executing program 0: 04:37:01 executing program 1: 04:37:02 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 04:37:02 executing program 3: 04:37:02 executing program 0: 04:37:02 executing program 1: 04:37:02 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 04:37:04 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:37:04 executing program 0: 04:37:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x0) 04:37:04 executing program 1: 04:37:04 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 04:37:04 executing program 0: 04:37:04 executing program 0: 04:37:05 executing program 1: 04:37:05 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 04:37:05 executing program 0: 04:37:05 executing program 0: 04:37:05 executing program 1: 04:37:07 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:37:07 executing program 0: 04:37:07 executing program 1: 04:37:07 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 04:37:07 executing program 3: 04:37:07 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 04:37:07 executing program 0: 04:37:07 executing program 3: 04:37:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) 04:37:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000dc9ff0)={0x2, 0x4e20}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000000)=0x8080000001, 0x4) r2 = accept4(r1, 0x0, &(0x7f0000002a80), 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) socketpair(0x0, 0x0, 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0xffffffffffffff89) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x800) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) getsockopt$sock_timeval(r3, 0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_DEL(r2, 0x0, 0x20000080) getpeername$inet(r1, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) 04:37:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x16, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffffff00000000, 0xe, 0x0, &(0x7f00000000c0)="c10e85f98ad0e679055e19f25b0d", 0x0, 0x1f36}, 0x28) 04:37:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) write(r1, &(0x7f0000000280)="a2", 0x1) r2 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 630.412460] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Dropping request. Check SNMP counters. 04:37:10 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:37:10 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 04:37:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/ptmx\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 04:37:10 executing program 3: 04:37:10 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 04:37:10 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 04:37:11 executing program 3: 04:37:11 executing program 1: 04:37:11 executing program 0: 04:37:11 executing program 3: 04:37:11 executing program 1: 04:37:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x20000ffd}) ioctl$FS_IOC_FSSETXATTR(r0, 0xc020660b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x2}) 04:37:13 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:37:13 executing program 1: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 04:37:13 executing program 3: setresgid(0x0, 0xee00, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") renameat2(r0, &(0x7f0000000340)='./file0\x00', r0, &(0x7f00000000c0)='./file1\x00', 0x0) 04:37:13 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file'], 0x9) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 04:37:13 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) capset(&(0x7f0000000000)={0x0, r0}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 04:37:14 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 04:37:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8000001000008912, &(0x7f0000000180)="11dca5055e0bcfec7be070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000000)) ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000000140)={&(0x7f0000000000)=""/108, 0x6c}) 04:37:14 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./fil'], 0x8) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:37:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80), 0x400000000000368, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000340)={0x18, 0x73, 0x0, {{0x70, 0x0, 0x2}}}, 0x18) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4000084) 04:37:14 executing program 1: mknod(&(0x7f0000000100)='./bus\x00', 0x3a0914c44f7b802d, 0x1b00) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x400000003fd, 0x0) pwritev(r0, &(0x7f0000000740)=[{&(0x7f0000000000)="d5f2237dd2b36b0c05c8a899fc9f3e1f0a527f8bed61b60b15f6063ebf0bed7bbfd5f3c9bb4d6e79afaff94c462d", 0x2e}], 0x1, 0x0) execve(0x0, 0x0, 0x0) 04:37:14 executing program 1: syz_execute_func(&(0x7f00000001c0)="410f01f9c4e1f573d50664ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110d4b842419dcccc") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x800083102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) clone(0x3102001ff3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', 0x0, 0x0, 0x0) 04:37:14 executing program 3: setresgid(0x0, 0xee00, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) renameat2(r0, &(0x7f0000000340)='./file0\x00', r0, &(0x7f00000000c0)='./file1\x00', 0x0) 04:37:17 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:37:17 executing program 3: r0 = socket$inet(0x10, 0x2, 0xc) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000010407051dfffd946fa283000c200a0009000100031d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 04:37:17 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 04:37:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000140)={0x2, 0x2000004e20, @broadcast}, 0x10) setsockopt$sock_int(r1, 0x1, 0x2000000012, &(0x7f0000000000)=0x7ffffffffe, 0x4) sendto$inet(r1, 0x0, 0x2bc, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000240), 0x13f698e4b9e296e3, 0x0, 0x0, 0xffffffffffffff06) 04:37:17 executing program 0: getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000100)=[{0x100080000006, 0x0, 0x0, 0x50000}]}) sendto$unix(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x4051, 0x0, 0x0) [ 639.370374] audit: type=1400 audit(1556167037.008:216): avc: denied { write } for pid=27617 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 04:37:17 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 04:37:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) 04:37:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000000301ffff808fdb003d88c8f00010ae1b"], 0x14}}, 0x0) 04:37:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x4000000003, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000220007031dfffd946f610500020000000000fd21fe1c4095421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 04:37:17 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 04:37:17 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0200000000000000"], 0x8}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB]) fsetxattr$security_selinux(r0, 0x0, &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 04:37:17 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 04:37:20 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:37:20 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'lo\x00', {0x2, 0x0, @multicast1}}) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000180)=0x40) setsockopt$inet_buf(r0, 0x0, 0x100000040, &(0x7f0000000040), 0x0) 04:37:20 executing program 0: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) open$dir(0x0, 0x0, 0x0) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) gettid() epoll_wait(r0, 0x0, 0x0, 0x2) flock(r0, 0x0) 04:37:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xffffffffffffffff) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/prev\x00') sendfile(r0, r1, 0x0, 0x800000bf) 04:37:20 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f00000001c0), 0x0}, 0xc) 04:37:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) socket$key(0xf, 0x3, 0x2) close(r0) 04:37:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 04:37:20 executing program 1: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="73656369726974790900000000000000efffff7f0000010000000000000000001e9affffff0008a159dc75d0a4d500ff0000000000bc158a3701"], 0x1) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) futex(&(0x7f0000000600)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x35) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:37:20 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 04:37:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x0, 0x0, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) dup3(r1, r0, 0x0) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x3, 0x0, 0x0) 04:37:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="5500000018007f1412fe01b2a4a280930a06000000a84306910500000b000f0035020000060000001900154002000001d40000dc1338d54400009b84136ef75afb83de44110016000d0004000000060cec4faba7d4", 0x55}], 0x1}, 0x0) 04:37:23 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:37:23 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60f4, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 04:37:23 executing program 0: 04:37:23 executing program 3: 04:37:23 executing program 3: 04:37:23 executing program 0: 04:37:23 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000180007041dfffd946f6105000af000001f0000000400080008000300022bd000", 0x24}], 0x1}, 0x0) 04:37:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)='\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 04:37:23 executing program 1: 04:37:23 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 04:37:23 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:37:23 executing program 5: 04:37:23 executing program 1: 04:37:23 executing program 3: 04:37:23 executing program 3: 04:37:23 executing program 1: 04:37:23 executing program 5: 04:37:23 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:37:23 executing program 3: 04:37:24 executing program 5: 04:37:24 executing program 1: 04:37:26 executing program 1: 04:37:26 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:37:26 executing program 0: 04:37:26 executing program 3: 04:37:26 executing program 5: 04:37:26 executing program 4: 04:37:26 executing program 1: 04:37:26 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:37:26 executing program 5: 04:37:26 executing program 0: 04:37:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xffffffffffffffff) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:37:26 executing program 4: 04:37:26 executing program 0: 04:37:26 executing program 5: 04:37:26 executing program 1: 04:37:26 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:37:26 executing program 0: 04:37:26 executing program 4: 04:37:26 executing program 5: 04:37:26 executing program 3: 04:37:26 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000008, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x2a) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 04:37:26 executing program 0: 04:37:26 executing program 1: 04:37:26 executing program 3: 04:37:26 executing program 4: 04:37:26 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="009000000000000000004c00000000000000000000000000e0e51532000000000200880126001000000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055", 0x5f, 0x1a0}]) 04:37:26 executing program 1: getpeername(0xffffffffffffff9c, 0x0, &(0x7f0000000540)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0303, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="009000000000000000004c00000000000000000000000000e0e51532000000000200880126001000000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) socket$inet(0x2, 0x6, 0x1000) 04:37:26 executing program 3: 04:37:26 executing program 0: 04:37:26 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000008, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x2a) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 04:37:26 executing program 3: 04:37:26 executing program 4: 04:37:26 executing program 0: 04:37:26 executing program 3: 04:37:26 executing program 2: socket$packet(0x11, 0x2, 0x300) clone(0x13102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000008, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x2a) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 04:37:26 executing program 0: 04:37:26 executing program 4: [ 649.160591] loop1: p1 p2 p3 p4 04:37:26 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="009000000000000000004c00000000000000000000000000e0e51532000000000200880126001000000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055", 0x5f, 0x1a0}]) [ 664.926481] ip6_tunnel: ] xmit: Local address not yet configured! [ 859.486684] INFO: task syz-executor.1:27819 blocked for more than 140 seconds. [ 859.494275] Not tainted 4.9.170+ #48 [ 859.498698] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 859.506753] syz-executor.1 D25544 27819 2123 0x00000004 [ 859.512594] ffff8801a2a65f00 ffff88019fd25280 ffff8801db621000 ffff8801c930c740 [ 859.520732] ffff8801db621018 ffff8801911afb28 ffffffff82801a4e 0000000000000000 [ 859.529032] ffff8801a2a65f00 00ff8801911afb58 ffff8801db6218f0 1ffff10032235f54 [ 859.537157] Call Trace: [ 859.539761] [<000000009a534431>] ? __schedule+0x6ce/0x1f10 [ 859.545467] [<000000001cfccba5>] ? io_schedule_timeout+0x390/0x390 [ 859.552349] [<000000009dbb3f80>] ? mark_held_locks+0xb1/0x100 [ 859.558370] [<00000000fd7b6554>] schedule+0x92/0x1c0 [ 859.563556] [<00000000ace82c9b>] schedule_preempt_disabled+0x13/0x20 [ 859.570875] [<000000006896c98d>] mutex_lock_nested+0x38d/0x920 [ 859.576985] [<000000004d92546c>] ? lo_release+0x84/0x1b0 [ 859.582615] [<00000000b13dd208>] ? mutex_trylock+0x3f0/0x3f0 [ 859.588635] [<000000008c48bc63>] ? __blkdev_put+0x219/0x840 [ 859.594504] [<0000000056de58e5>] ? __blkdev_put+0x3c2/0x840 [ 859.600386] [<00000000353045bc>] ? loop_queue_work+0x2350/0x2350 [ 859.606673] [<000000004d92546c>] lo_release+0x84/0x1b0 [ 859.612262] [<00000000353045bc>] ? loop_queue_work+0x2350/0x2350 [ 859.618692] [<00000000a1e58e77>] __blkdev_put+0x461/0x840 [ 859.624419] [<0000000017dad1dd>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 859.631537] [<00000000ad8440cf>] ? bd_set_size+0xb0/0xb0 [ 859.637120] [<00000000b1bb6996>] ? __ww_mutex_lock_interruptible+0x1530/0x1530 [ 859.644561] [<00000000ed8d423a>] ? check_preemption_disabled+0x3c/0x200 [ 859.659604] [<000000001644b501>] blkdev_put+0x88/0x560 [ 859.665082] [<00000000e5a9c2c4>] ? blkdev_put+0x560/0x560 [ 859.670969] [<000000006de43721>] blkdev_close+0x8b/0xb0 [ 859.676830] [<00000000be02817f>] __fput+0x274/0x720 [ 859.682465] [<00000000a46f7bdf>] ____fput+0x16/0x20 [ 859.687641] [<00000000bd85039e>] task_work_run+0x108/0x180 [ 859.693488] [<00000000f7c980ab>] exit_to_usermode_loop+0x13b/0x160 [ 859.700760] [<000000000a3e26f2>] do_syscall_64+0x3f7/0x570 [ 859.706598] [<00000000c244213a>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 859.713603] [ 859.713603] Showing all locks held in the system: [ 859.719970] 2 locks held by khungtaskd/24: [ 859.724386] #0: (rcu_read_lock){......}, at: [<00000000042cb858>] watchdog+0x14b/0xaf0 [ 859.733438] #1: (tasklist_lock){.+.+..}, at: [<00000000a5202a06>] debug_show_all_locks+0x7f/0x21f [ 859.743448] 1 lock held by rsyslogd/1897: [ 859.747664] #0: (&f->f_pos_lock){+.+.+.}, at: [<000000004b346bf0>] __fdget_pos+0xa8/0xd0 [ 859.756948] 2 locks held by getty/2024: [ 859.761088] #0: (&tty->ldisc_sem){++++++}, at: [<000000006cfd64bc>] ldsem_down_read+0x33/0x40 [ 859.770578] #1: (&ldata->atomic_read_lock){+.+...}, at: [<000000000f99d018>] n_tty_read+0x1fe/0x1820 [ 859.780708] 3 locks held by syz-executor.1/27819: [ 859.785623] #0: (&bdev->bd_mutex){+.+.+.}, at: [<000000006c3260cf>] __blkdev_put+0xbb/0x840 [ 859.794890] #1: (loop_index_mutex){+.+.+.}, at: [<00000000b2b724d3>] lo_release+0x1e/0x1b0 [ 859.804160] #2: (loop_ctl_mutex#2){+.+.+.}, at: [<000000004d92546c>] lo_release+0x84/0x1b0 [ 859.813489] 1 lock held by syz-executor.1/27827: [ 859.818308] #0: (&bdev->bd_mutex){+.+.+.}, at: [<00000000908469ab>] __blkdev_get+0x10e/0xeb0 [ 859.827637] 2 locks held by syz-executor.5/27846: [ 859.832462] #0: (loop_ctl_mutex/1){+.+.+.}, at: [<00000000cb719fa6>] lo_ioctl+0x85/0x1a10 [ 859.841611] #1: (&bdev->bd_mutex){+.+.+.}, at: [<000000009f1e235c>] blkdev_reread_part+0x1f/0x40 [ 859.851503] 2 locks held by blkid/27848: [ 859.855632] #0: (&bdev->bd_mutex){+.+.+.}, at: [<00000000908469ab>] __blkdev_get+0x10e/0xeb0 [ 859.864943] #1: (loop_index_mutex){+.+.+.}, at: [<000000001536700a>] lo_open+0x1d/0xb0 [ 859.873726] 2 locks held by blkid/27854: [ 859.877926] #0: (&bdev->bd_mutex){+.+.+.}, at: [<00000000908469ab>] __blkdev_get+0x10e/0xeb0 [ 859.887364] #1: (loop_index_mutex){+.+.+.}, at: [<000000001536700a>] lo_open+0x1d/0xb0 [ 859.896352] 1 lock held by blkid/27856: [ 859.900372] #0: (&bdev->bd_mutex){+.+.+.}, at: [<00000000908469ab>] __blkdev_get+0x10e/0xeb0 [ 859.909820] [ 859.911428] ============================================= [ 859.911428] [ 859.919087] NMI backtrace for cpu 1 [ 859.922758] CPU: 1 PID: 24 Comm: khungtaskd Not tainted 4.9.170+ #48 [ 859.929310] ffff8801d98d7cc8 ffffffff81b4fb21 0000000000000001 0000000000000000 [ 859.937575] 0000000000000001 ffffffff81097401 dffffc0000000000 ffff8801d98d7d00 [ 859.945606] ffffffff81b5adbc 0000000000000001 0000000000000000 0000000000000001 [ 859.953703] Call Trace: [ 859.956274] [<000000007d8c206b>] dump_stack+0xc1/0x120 [ 859.961729] [<0000000085d0be5b>] ? irq_force_complete_move+0x281/0x300 [ 859.968462] [<00000000c030d73c>] nmi_cpu_backtrace.cold+0x47/0x87 [ 859.974946] [<00000000ed17919a>] ? irq_force_complete_move+0x300/0x300 [ 859.981680] [<0000000075d8e8b8>] nmi_trigger_cpumask_backtrace+0x124/0x155 [ 859.988941] [<00000000f167eda1>] arch_trigger_cpumask_backtrace+0x14/0x20 [ 859.995955] [<0000000095a9c2ae>] watchdog+0x670/0xaf0 [ 860.001226] [<00000000042cb858>] ? watchdog+0x14b/0xaf0 [ 860.006868] [<0000000017dad1dd>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 860.013694] [<00000000eaf676c9>] ? hungtask_pm_notify+0x60/0x60 [ 860.019823] [<00000000ccc6eccc>] kthread+0x278/0x310 [ 860.025014] [<0000000065d9761d>] ? kthread_park+0xa0/0xa0 [ 860.030639] [<000000007b0091a4>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 860.037376] [<000000009364bfae>] ? _raw_spin_unlock_irq+0x39/0x60 [ 860.043738] [<0000000006c96afc>] ? finish_task_switch+0x1e5/0x660 [ 860.050046] [<0000000051bf4d20>] ? finish_task_switch+0x1b7/0x660 [ 860.056350] [<00000000c938f013>] ? __switch_to_asm+0x34/0x70 [ 860.062226] [<00000000528854ad>] ? __switch_to_asm+0x40/0x70 [ 860.068197] [<00000000c938f013>] ? __switch_to_asm+0x34/0x70 [ 860.074149] [<0000000065d9761d>] ? kthread_park+0xa0/0xa0 [ 860.079840] [<0000000065d9761d>] ? kthread_park+0xa0/0xa0 [ 860.085455] [<00000000bb3c686a>] ret_from_fork+0x5c/0x70 [ 860.091138] Sending NMI from CPU 1 to CPUs 0: [ 860.095674] NMI backtrace for cpu 0 skipped: idling at pc 0xffffffff82810ac2 [ 860.103194] Kernel panic - not syncing: hung_task: blocked tasks [ 860.109444] CPU: 0 PID: 24 Comm: khungtaskd Not tainted 4.9.170+ #48 [ 860.115968] ffff8801d98d7c60 ffffffff81b4fb21 ffff8801a2a65f00 ffffffff82a79d40 [ 860.123987] 00000000ffffffff 0000000000000000 dffffc0000000000 ffff8801d98d7d40 [ 860.132063] ffffffff813f966a 0000000041b58ab3 ffffffff82e2ef22 ffffffff813f9491 [ 860.140245] Call Trace: [ 860.142963] [<000000007d8c206b>] dump_stack+0xc1/0x120 [ 860.148340] [<00000000a1d65dc4>] panic+0x1d9/0x3bd [ 860.153396] [<000000007a45e1f3>] ? add_taint.cold+0x16/0x16 [ 860.159362] [<00000000ed17919a>] ? irq_force_complete_move+0x300/0x300 [ 860.166214] [<00000000e293657b>] ? ___preempt_schedule+0x16/0x18 [ 860.172431] [<000000005a23b335>] ? nmi_trigger_cpumask_backtrace+0x135/0x155 [ 860.179965] [<00000000be43022a>] ? nmi_trigger_cpumask_backtrace+0x13f/0x155 [ 860.187286] [<0000000066b0c38d>] watchdog+0x681/0xaf0 [ 860.192557] [<00000000042cb858>] ? watchdog+0x14b/0xaf0 [ 860.197989] [<0000000017dad1dd>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 860.205049] [<00000000eaf676c9>] ? hungtask_pm_notify+0x60/0x60 [ 860.211207] [<00000000ccc6eccc>] kthread+0x278/0x310 [ 860.216408] [<0000000065d9761d>] ? kthread_park+0xa0/0xa0 [ 860.222031] [<000000007b0091a4>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 860.229027] [<000000009364bfae>] ? _raw_spin_unlock_irq+0x39/0x60 [ 860.235422] [<0000000006c96afc>] ? finish_task_switch+0x1e5/0x660 [ 860.241757] [<0000000051bf4d20>] ? finish_task_switch+0x1b7/0x660 [ 860.248066] [<00000000c938f013>] ? __switch_to_asm+0x34/0x70 [ 860.254083] [<00000000528854ad>] ? __switch_to_asm+0x40/0x70 [ 860.260047] [<00000000c938f013>] ? __switch_to_asm+0x34/0x70 [ 860.265940] [<0000000065d9761d>] ? kthread_park+0xa0/0xa0 [ 860.271612] [<0000000065d9761d>] ? kthread_park+0xa0/0xa0 [ 860.277251] [<00000000bb3c686a>] ret_from_fork+0x5c/0x70 [ 860.283402] Kernel Offset: disabled [ 860.287212] Rebooting in 86400 seconds..