7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:21:50 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:50 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800), 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:21:50 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:50 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:50 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab972268", 0x83}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:21:51 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:51 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:51 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab972268", 0x83}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:21:51 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:51 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:51 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3", 0x87}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:21:51 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:52 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:52 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:52 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:52 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:52 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3", 0x87}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:21:52 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/331]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:53 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:53 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:53 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:53 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:53 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3", 0x87}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:21:54 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3", 0x87}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:21:54 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3", 0x87}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:21:54 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f000000000000000500"/331]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:54 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/331]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:54 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68d", 0x89}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:21:54 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:55 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:55 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f000000000000000500"/331]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:55 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/331]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:55 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68d", 0x89}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:21:55 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:55 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/331]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:56 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:56 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/331]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:56 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/331]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:56 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/331]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:56 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68d", 0x89}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:21:56 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:57 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:57 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/331]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:57 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:57 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7", 0x8a}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:21:57 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:57 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:57 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:57 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:58 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/331]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:58 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:58 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7", 0x8a}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:21:58 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:59 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:59 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:59 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) lseek(r2, 0x0, 0x2) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0xa5cc554) 14:21:59 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:59 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:21:59 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7", 0x8a}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:21:59 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) lseek(r2, 0x0, 0x2) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0xa5cc554) 14:21:59 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) lseek(r2, 0x0, 0x2) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0xa5cc554) 14:21:59 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:00 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:00 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(0x0, 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:00 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:00 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) lseek(r2, 0x0, 0x2) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0xa5cc554) 14:22:00 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:00 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:01 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:01 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(0x0, 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:01 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:01 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(0x0, 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:01 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:01 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:01 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d70000000000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:01 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:02 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(0x0, 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:02 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) lseek(r2, 0x0, 0x2) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0xa5cc554) 14:22:02 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:02 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:02 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:02 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:02 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:03 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:03 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:03 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfd12, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x11) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x1f4, 0x0, 0xfffffffffffffd60) 14:22:03 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:03 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfd12, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x11) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x1f4, 0x0, 0xfffffffffffffd60) 14:22:03 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfd12, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x11) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x1f4, 0x0, 0xfffffffffffffd60) 14:22:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfd12, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x11) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x1f4, 0x0, 0xfffffffffffffd60) 14:22:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfd12, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x11) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x1f4, 0x0, 0xfffffffffffffd60) 14:22:04 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:04 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:04 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:04 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d70000000000000005"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:04 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:04 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:05 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:05 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:05 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:05 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:05 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:05 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:06 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:06 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:06 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:06 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:06 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:06 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:07 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:07 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:07 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:07 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:07 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:07 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:08 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:08 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:08 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:08 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r3, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, 0x0, 0xfd12, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x11) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r3, &(0x7f0000000000), 0xfffffffffffffccf, 0x1f4, 0x0, 0xfffffffffffffd60) 14:22:08 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:08 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:08 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:09 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:09 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:09 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:09 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:09 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:09 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:10 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:10 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:10 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:10 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:10 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:10 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfd12, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x11) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x1f4, 0x0, 0xfffffffffffffd60) 14:22:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfd12, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x11) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x1f4, 0x0, 0xfffffffffffffd60) 14:22:11 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:11 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:11 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:11 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) r2 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfd12, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x11) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x1f4, 0x0, 0xfffffffffffffd60) 14:22:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) r2 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfd12, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x11) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x1f4, 0x0, 0xfffffffffffffd60) 14:22:11 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfd12, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x11) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x1f4, 0x0, 0xfffffffffffffd60) 14:22:11 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) syz_genetlink_get_family_id$tipc2(0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:12 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:12 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:12 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:12 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:12 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfd12, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x11) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x1f4, 0x0, 0xfffffffffffffd60) 14:22:12 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:12 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:12 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, 0x0, &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:13 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:13 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:13 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:13 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:13 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) fcntl$getflags(0xffffffffffffffff, 0xe) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, 0xffffffffffffffff) sendfile(r4, r4, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$LOOP_SET_FD(r4, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r5 = dup(0xffffffffffffffff) execveat(r5, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r6 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r5, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r6, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r3, 0x0, 0xa5cc554) 14:22:13 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r7 = dup(0xffffffffffffffff) execveat(r7, 0x0, &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:13 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:14 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, 0x0, &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:14 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r3, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, 0x0, 0xfd12, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x11) sendto$inet(r3, &(0x7f0000000000), 0xfffffffffffffccf, 0x1f4, 0x0, 0xfffffffffffffd60) 14:22:14 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) fcntl$getflags(0xffffffffffffffff, 0xe) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, 0xffffffffffffffff) sendfile(r4, r4, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$LOOP_SET_FD(r4, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r5 = dup(0xffffffffffffffff) execveat(r5, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r6 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r5, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r6, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r3, 0x0, 0xa5cc554) 14:22:14 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:14 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, 0x0, &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:14 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x0) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:15 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000040)={'veth0_to_bond\x00', @broadcast}) 14:22:15 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:15 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)=0x20008088) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0x8db9) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="04"], 0x1) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 14:22:15 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) fcntl$getflags(0xffffffffffffffff, 0xe) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, 0xffffffffffffffff) sendfile(r4, r4, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$LOOP_SET_FD(r4, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r5 = dup(0xffffffffffffffff) execveat(r5, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r6 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r5, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r6, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r3, 0x0, 0xa5cc554) 14:22:15 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:15 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x0) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:15 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:16 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)=0x20008088) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0x8db9) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="04"], 0x1) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 14:22:16 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:16 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:16 executing program 1: lsetxattr$trusted_overlay_origin(0x0, 0x0, &(0x7f0000000080)='y\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') socket$inet_tcp(0x2, 0x1, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 14:22:16 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(0xffffffffffffffff, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x1d) 14:22:16 executing program 1: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x890b, &(0x7f0000000000)={'ifb0\x02\x00\x00\x00\x02\x00', @ifru_map}) 14:22:16 executing program 1: open(0x0, 0x0, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe}) socket$inet_tcp(0x2, 0x1, 0x0) 14:22:16 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:16 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000000), 0x4) 14:22:16 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000014c0)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r0, &(0x7f0000004e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 14:22:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 14:22:17 executing program 1: r0 = socket$inet6(0xa, 0x8000000000080001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000094440000000000000000000000050000000a00000000000000ff02000000000000000000000000000100000000000000000000000000000000000000005000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000edffffffffffffff00000003000000000000000000000000000000000000000000000000000000eeffffff00000000e2ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000c4d300000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff02000000000000000000000000000100000000080000000000000000000000000000000000000000000000000040ac0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000001c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000404110061ca7c55a5e42d81d1e234c789375b23d36d0b7bd15e04e813cd723f47ce56dffa04c1f203e51942829b769c021a132a47ccf4ac88c150bfed88c8aa4db6efaf6839814663b22c44fc5c577657253c50de4d1797c8a8195d482f8537d4f9aeaf495c01d5a31348917325b55b4136f49a20b50d881350d03870439d9759097585033743069099a0c14b7ca9b9fdbba4b31e8658d38d801fc074013102247ae529fe94b9529742c76d1825a441f8205c765deabf008b3e6ac5064c0c2ca8030c651abbfe7fe8803ff6a2a5de91470a21ed3a29fbe853bf2625e00600d9e32fdac5c79c83d19c110c2cccfc32f7f99ea69994f81d903641120915cdcf49efeed42a2054e0544b5f53f43e4f7ab5b6037071e14229606aa0c3d7b7313232a904dbaedc6bd9fe7a1e54afc699624941b6c58fe24ca2338d97bbae7b60c350e72039f84328e39fdf444997aa080a882a81da917d4739bcbb223be6d19106fa4a239fa48a231a9786875523675a7058bc9135228354b3c161cd1c0d0e38d3e1514182f02f3a3a5273fa134e2756aee14acf52e878855b3c2d10bcc65caa785eb923078eebe9a92a0010fd0d9d4175cac3fa4c2ffa948ef6ace5b105904f91733855793c9e18e122e47a5cbf17b194016d3f938504c682a6e79af70f6028f13657100e36d31586511114091a8155a90889521a35f3997b6aa2e120fc6f1d8d38960e3659620e0c6192950e94000000000000000000000000000000003eb09ed9381be96996002d301735aa505e22a9336b362a1a28c3a0f70cc499152a43db91fa9e1569083a5d522702cd13ccba06629a50b3c11482cf9a948bcadbdae6da92f4d1a9b6bbea4b5faa8a9661ee1ccc6ef24efeafa4e233e36dfba0d7cba9be865b767c409cc5d90dfdd6ff9fe276fbf345b8af202eb993eb2548bdd841a4bb28e65b4125da980f6419f80eef639d7b90243b8fb9717755408f551411af115da7cf3e52d99a30bdc09d58cdbb55d997d51a57fb71a77b05ea854cb2675ab5"], 0x310) r1 = socket$inet6(0xa, 0x8000000000080001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r2 = socket$inet6(0xa, 0x8000000000080001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x8000000000080001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r4, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000094440000000000000000000000050000000a00000000000000ff02000000000000000000000000000100000000000000000000000000000000000000005000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff010000000000000000000000000001000400000000000000000000edffffffffffffff00000003000000000000000000000000000000000000000000000000000000eeffffff00000000e2ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000c4d300000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff02000000a20000000000000000000100000000080000000000000000000000000000000000000000000000000040ac0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000001c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000404110061ca7c55a5e42d81d1e234c789375b23d36d0b7bd15e04e813cd723f47ce56dffa04c1f203e51942829b769c021a132a47ccf4ac88c150bfed88c8aa4db6efaf6839814663b22c44fc5c577657253c50de4d1797c8a8195d482f8537d4f9aeaf495c01d5a31348917325b55b4136f49a20b50d881350d03870439d9759097585033743069099a0c14b7ca9b9fdbba4b31e8658d38d801fc074013102247ae529fe94b9529742c76d1825a441f8205c765deabf008b3e6ac5064c0c2ca8030c651abbfe7fe8803ff6a2a5de91470a21ed3a29fbe853bf2625e00600d9e32fdac5c79c83d19c110c2cccfc32f7f99ea69994f81d903641120915cdcf49efeed42a2054e0544b5f53f43e4f7ab5b6037071e14229606aa0c3d7b7313232a904dbaedc6bd9fe7a1e54afc699624941b6c58fe24ca2338d97bbae7b60c350e72039f84328e39fdf444997aa080a882a81da917d4739bcbb223be6d19106fa4a239fa48a231a9786875523675a7058bc9135228354b3c161cd1c0d0e38d3e1514182f02f3a3a5273fa134e2756aee14acf52e878855b3c2d10bcc65caa785eb923078eebe9a92a0010fd0d9d4175cac3fa4c2ffa948ef6ace5b105904f91733855793c9e18e122e47a5cbf17b194016d3f938504c682a6e79af70f6028f13657100e36d31586511114091a8155a90889521a35f3997b6aa2e120fc6f1d8d38960e3659620e0c6192950e94000000000000000000000000000000003eb09ed9381be96996002d301735aa505e22a9336b362a1a28c3a0f70cc499152a43db91fa9e1569083a5d522702cd13ccba06629a50b3c11482cf9a948bcadbdae6da92f4d1a9b6bbea4b5faa8a9661ee1ccc6ef24efeafa4e233e36dfba0d7cba9be865b767c409cc5d90dfdd6ff9fe276fbf345b8af202eb993eb2548bdd841a4bb28e65b4125da980f6419f80eef639d7b90243b8fb9717755408f551411af115da7cf3e52d99a30bdc09d58cdbb55d997d51a57fb71a77b05ea854cb2675ab5"], 0x310) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000600)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 14:22:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) r4 = socket(0x1, 0x2, 0x0) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r3, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x300, 0x0) 14:22:17 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:17 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x88, 0x0, @empty, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 14:22:17 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(0xffffffffffffffff, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:17 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0x12e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:22:17 executing program 4: open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_vs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 14:22:17 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:17 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf32(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x227) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xd4b9db3) syz_genetlink_get_family_id$fou(0x0) write$cgroup_type(r1, 0x0, 0x0) socket(0x0, 0x0, 0x0) r3 = dup(r0) sendmsg$nl_netfilter(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="a5"], 0x1}}, 0x0) 14:22:18 executing program 4: unshare(0x28020400) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cmdline\x00') ioctl$RTC_WIE_ON(r0, 0x700f) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) 14:22:18 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(0xffffffffffffffff, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:18 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:18 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:18 executing program 4: r0 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$chown(0x4, r0, r2, 0x0) 14:22:18 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = creat(0x0, 0x0) write$P9_RGETLOCK(r0, 0x0, 0x0) 14:22:18 executing program 4: 14:22:18 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x0) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:20 executing program 1: 14:22:20 executing program 4: 14:22:20 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:20 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:20 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:20 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x0) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:20 executing program 4: 14:22:20 executing program 4: 14:22:20 executing program 1: r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0x10226) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) 14:22:20 executing program 4: 14:22:20 executing program 4: 14:22:20 executing program 4: 14:22:20 executing program 1: 14:22:20 executing program 4: 14:22:21 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:21 executing program 1: 14:22:21 executing program 4: 14:22:21 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x0) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:21 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:21 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:21 executing program 1: 14:22:21 executing program 4: 14:22:21 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:21 executing program 1: 14:22:21 executing program 4: 14:22:21 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:21 executing program 1: 14:22:21 executing program 1: 14:22:21 executing program 4: 14:22:22 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:22 executing program 4: 14:22:22 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:22 executing program 5: pipe(&(0x7f0000000080)) epoll_create(0x3) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:22 executing program 1: 14:22:22 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:22 executing program 4: 14:22:22 executing program 1: 14:22:22 executing program 1: 14:22:22 executing program 4: 14:22:22 executing program 4: 14:22:22 executing program 4: 14:22:23 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:23 executing program 4: 14:22:23 executing program 1: 14:22:23 executing program 5: pipe(&(0x7f0000000080)) epoll_create(0x3) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:23 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x0) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:23 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:23 executing program 1: 14:22:23 executing program 4: 14:22:23 executing program 4: 14:22:23 executing program 1: 14:22:23 executing program 4: 14:22:23 executing program 1: 14:22:24 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:24 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:24 executing program 1: 14:22:24 executing program 4: 14:22:24 executing program 5: pipe(&(0x7f0000000080)) epoll_create(0x3) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:24 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x0) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:24 executing program 4: 14:22:24 executing program 1: 14:22:24 executing program 1: 14:22:24 executing program 4: 14:22:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 14:22:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x4, 0x12, r0, 0x0) 14:22:24 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, 0x0, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="a4c87a2bbff7b94efc08ab12f728db4b2b4d2f2fba03988cdcdf96ac4fad0b3a47006db763e3a227deb6999d32772cf2eebb1fb5", 0x34}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:22:24 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:24 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x1000000000009) 14:22:24 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x0) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:25 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:25 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xfb3f) creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x10001) r1 = socket(0x2, 0x803, 0xff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x72439a6b) sendto$packet(r1, &(0x7f0000000180)="e7dc6e3b38d8e20a65497da361aa0ad7ddc70fc984dd3e11c02d11f09f0b543d0b8bf8af1b1fbb86b7aa2212f4e82276d8177db64569030f5dcf08cf0a10ba8cb7f67c50a62942bdc85d6cf6350d5da8f73c2ba1ef967d5119872a2c03192b3099882662bf2e0ee1d8cacb9d86937cec687fc90c0cca8591c02a1bca4c25b0768fc2c0af03fdc247e67b", 0x8a, 0x40, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x4404) creat(0x0, 0x0) creat(0x0, 0x0) 14:22:25 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:25 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:25 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, 0x0, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:25 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:25 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x2) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000fffffffe) writev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0xa5cc554) 14:22:26 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x0) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:27 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:27 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x2) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000fffffffe) writev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0xa5cc554) 14:22:27 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:27 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:27 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, 0x0, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:27 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:28 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x2) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000fffffffe) writev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0xa5cc554) 14:22:28 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r4, 0x0, 0x8000fffffffe) writev(r1, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r4, 0x0, 0xa5cc554) 14:22:28 executing program 5: r0 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:28 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:28 executing program 5: r0 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:28 executing program 5: r0 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:29 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:29 executing program 5: pipe(0x0) r0 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:29 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, 0x0, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:29 executing program 5: pipe(0x0) r0 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:29 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:29 executing program 5: pipe(0x0) r0 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:29 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:29 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r4, 0x0, 0x8000fffffffe) writev(r1, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r4, 0x0, 0xa5cc554) 14:22:29 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:30 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:30 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:30 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:30 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:30 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r4, 0x0, 0x8000fffffffe) writev(r1, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r4, 0x0, 0xa5cc554) 14:22:30 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:31 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:31 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r4, 0x0, 0x8000fffffffe) writev(r1, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r4, 0x0, 0xa5cc554) 14:22:31 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:31 executing program 1: pipe(0x0) r0 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:31 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:31 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x0) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:31 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) fchdir(0xffffffffffffffff) r1 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r4, 0x0, 0x8000fffffffe) writev(r1, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r4, 0x0, 0xa5cc554) 14:22:32 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040), 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:32 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:32 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:32 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:32 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) fchdir(0xffffffffffffffff) r1 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r4, 0x0, 0x8000fffffffe) writev(r1, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r4, 0x0, 0xa5cc554) 14:22:32 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x0) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:33 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040), 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:33 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:33 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:33 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:33 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) fchdir(0xffffffffffffffff) r1 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r4, 0x0, 0x8000fffffffe) writev(r1, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r7, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r4, 0x0, 0xa5cc554) 14:22:33 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x0) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:33 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000e00000030000000000000002000000b90000000700000000000000ffffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff080000000000000000000000400000f70000000000000000000000000000000000000000000000000000000000000000ffff0000000000000001000000400000060000000000000000000000000000000000000000000000000008000000000000000c00000000000000560c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000020000000000000000000045000000000000000000003cdb8000000000000000000000000000000089001100000000007f00000000000000050000000000000000000000000000000000000000000000000100000000210000070000000400000200000000000000d700000000000000050000"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040), 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:34 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:34 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:34 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) 14:22:34 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b545", @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:34 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040), 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:34 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, 0x0}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) 14:22:35 executing program 5: pipe(&(0x7f0000000080)) r0 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) 14:22:35 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r3, &(0x7f00000001c0), 0xfffffef3) setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000300)='./cgroup.cpu\x00', 0xd, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r4, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r5, r5, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r6 = dup(0xffffffffffffffff) execveat(r6, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61000081}, 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r7, @ANYBLOB="28002dbd7000fcdbdf25160000003c000900000800010020000000080001a04f82fe7daf468a000c4fdf1efccca701000000080002000600000008000200ff7f00004c000400340007000800020020000000080001000c00000008000300ffffffff0800020009000000080002000008000008000400010100001400070008000100070000000800040008000000040005001800020008000100fdffffff0400040008000100a72200002800050008000100696200001c00020008000100130000000800020000000000084027e29f942b821eae8ab7becdaafd0a12c1e760e8b8ff5cb1c933ac01be04a7becacaad886db189322dfbf5e55a0d6ec004f6a26440b77f7bce6c2fb9004ae1cda34b60e5ba5734ad43070bd4386e983c3053c00000000000000000203f654626de5f2e91b20506099f132aac3958db3020959b6289737de777ec5a1053c898b5667a69bd8f12d9f790219c33b7d30c796d898f9cfc7a7a628f21b014fda3aeebbeb6277c8d314a400f85a9237b1f32c74687f748f3c74d805e66f4a79f4919396610dcd28a7cb19ffdb80b0310d30ea14b9b333a1703b6b06c2b4cc07b3a353a48bbba7931cb87277f6827fa13000000000000004153bd9d1ffc202f0f6a3145f52c518fa723aee691f845fbd69394d9a27811e962bb5efa8cb2fbbe0d3bbb29db91a6b4e9abcbf968ec862fd705d7418b030750a0aeceb4a7f52ac1b54d8986f534ca8dbaa4bdc7c057731c16754dd4a13d0a954d833005c6d52ae5163eac45127fdb0f44c66a6f1e0cf876297c6cd8f731daef66bf2cff8eb96e0b1dfc"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r4, 0x0, 0xa5cc554) [ 1628.281606] ------------[ cut here ]------------ [ 1628.286395] kernel BUG at mm/vmstat.c:1425! [ 1628.290701] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1628.296561] Modules linked in: [ 1628.299865] CPU: 1 PID: 2138 Comm: kworker/1:2 Not tainted 4.4.174+ #4 [ 1628.306535] Workqueue: vmstat vmstat_update [ 1628.310977] task: ffff8800b6934740 task.stack: ffff8800b8148000 [ 1628.317014] RIP: 0010:[] [] vmstat_update+0x99/0xb0 [ 1628.326014] RSP: 0018:ffff8800b814fbc0 EFLAGS: 00010287 [ 1628.331457] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000000000000000 [ 1628.338718] RDX: 0000000000000000 RSI: ffffffff81b0abec RDI: ffff8800b6934b38 [ 1628.345980] RBP: ffff8800b814fbe0 R08: ffffffff82836950 R09: ffff8800b6935050 [ 1628.353237] R10: ffffffff83a3a960 R11: 0000000000000000 R12: ffff8801db71b380 [ 1628.360486] R13: ffff8800b814fc78 R14: ffff8801d86e4e00 R15: ffff8801db71df00 [ 1628.367776] FS: 0000000000000000(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 [ 1628.375991] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1628.381864] CR2: 0000001b2f82a000 CR3: 00000001b7b8c000 CR4: 00000000001606b0 [ 1628.389126] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1628.396383] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1628.403631] Stack: [ 1628.405764] 0000000000000000 ffff8801db71b380 ffff8800b814fc78 ffff8801d86e4e00 [ 1628.413787] ffff8800b814fd00 ffffffff81122c25 ffffffff81122b42 ffffffff81159431 [ 1628.421930] ffff8801d86e4e48 ffff8801d99bcf00 ffff880100000000 ffff8801d86e4e20 [ 1628.430509] Call Trace: [ 1628.433080] [] process_one_work+0x825/0x1720 [ 1628.439122] [] ? process_one_work+0x742/0x1720 [ 1628.445342] [] ? finish_task_switch+0x1e1/0x660 [ 1628.451652] [] ? cancel_delayed_work_sync+0x20/0x20 [ 1628.458299] [] worker_thread+0x4e4/0xf50 [ 1628.463991] [] ? __schedule+0x7e3/0x1ee0 [ 1628.469676] [] ? process_one_work+0x1720/0x1720 [ 1628.475973] [] kthread+0x273/0x310 [ 1628.481147] [] ? kthread_create_on_node+0x4c0/0x4c0 [ 1628.487894] [] ? _raw_spin_unlock_irq+0x39/0x60 [ 1628.494204] [] ? finish_task_switch+0x1e1/0x660 [ 1628.500501] [] ? finish_task_switch+0x1b3/0x660 [ 1628.506802] [] ? __schedule+0x7af/0x1ee0 [ 1628.512497] [] ? __schedule+0x7a3/0x1ee0 [ 1628.518224] [] ? __schedule+0x7af/0x1ee0 [ 1628.523916] [] ? kthread_create_on_node+0x4c0/0x4c0 [ 1628.530969] [] ret_from_fork+0x55/0x80 [ 1628.536482] [] ? kthread_create_on_node+0x4c0/0x4c0 [ 1628.543120] Code: 89 f6 e8 4b 95 d1 ff 5b 41 5c 41 5d 41 5e 5d c3 e8 cd e3 6f 00 89 c0 f0 48 0f ab 05 92 f4 c1 02 72 09 5b 41 5c 41 5d 41 5e 5d c3 <0f> 0b e8 c0 84 07 00 eb af 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 [ 1628.570460] RIP [] vmstat_update+0x99/0xb0 [ 1628.576457] RSP 14:22:35 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) open(0x0, 0x475100, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(0xffffffffffffffff, 0xe) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0xffffffffffffffe8) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, 0x0, 0x8000fffffffe) writev(r2, &(0x7f0000000800)=[{&(0x7f0000000740)="072c1fb5ee415fd908429e9757bd25e49444e22afe2cc6d10dbb75b00146d915d5eeec29af419f866c789a1dd1107840f5226011a4c236d1a0f3d4411208e97891e83f460c33ce14d985b9fd5a6e5986e9faee22e96df6e90d055124695366ac1786e9b824610efad69a618b9bf2e236a81356b7d379d8f3ff0aafa43cdf5cab97226891d154a3b68dc7dd", 0x8b}], 0x1) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r6, r6, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) r7 = dup(0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000640)={&(0x7f0000000040), 0xc, &(0x7f0000000400)={&(0x7f0000000f00)=ANY=[@ANYBLOB="a8f5fee00063162a6544d2b5450000f080e8f2e757923b2afd0a", @ANYRES16=r8, @ANYBLOB="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"], 0xe0}}, 0x880) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r5, 0x0, 0xa5cc554) [ 1628.585120] ---[ end trace 109cffbd82ac0882 ]--- [ 1628.591005] Kernel panic - not syncing: Fatal exception [ 1628.596992] Kernel Offset: disabled [ 1628.600607] Rebooting in 86400 seconds..