0d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:04:57 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000002000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:57 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = dup(0xffffffffffffffff) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r4}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(0xffffffffffffffff, 0xc01064c7, &(0x7f00000000c0)={0x3, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0]}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="abd335ad06c36521922d1c9c0cf1b5ab6b2766616838f2f39dacf559767023eb940611ecdeccc267f755a3366e038d0f9cea4e2e2989022e81c7157e1225e36f31eea5620cd526bde45f58218e783bd046efecfe8ee6cfbe25b3849c20ecae2c0a0000000000"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:57 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00M\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:57 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00S\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:57 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:04:58 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000000001", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:58 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:04:58 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00N\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000000)=0xa, 0x4) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) socketpair$unix(0x1, 0x0, 0x0, 0x0) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:58 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:58 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:04:58 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00T\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:58 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) dup(r3) fchmod(r3, 0x118) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:58 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00O\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:58 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:04:58 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:58 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = semget$private(0x0, 0x207, 0x0) semctl$IPC_RMID(r2, 0x2, 0x10) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000000)=[0x7, 0xfffc, 0xfa, 0x5, 0x1]) r3 = dup(0xffffffffffffffff) getsockname$packet(r3, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="eae8d3f56fe6815c77a7f8f1dbbbe366043258f948094391d2a920e90470b66bf09d167dff53c7eb0c95a2d1f5001f66efe2bc211e071ef3f7994d4e3a46d7da8c1d1c82751f768d69a021b6"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) 02:04:58 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:04:58 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:58 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00U\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:58 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:04:58 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00020000000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:58 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) r3 = socket$inet6(0xa, 0x2, 0x0) dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2a}, 0x6}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:58 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:04:58 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00V\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:58 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00Q\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:59 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:04:59 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000010000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:59 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$NFT_BATCH(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a3000000000000000000400da92925f0200dd2c7d00000000000900010073797a3000000000080003400000000114"], 0x80}}, 0x0) 02:04:59 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:04:59 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00R\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:59 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00W\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:59 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:04:59 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000020000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:59 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00S\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:59 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:04:59 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0xe) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:59 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00X\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:59 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:59 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00T\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:59 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:04:59 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:04:59 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) r3 = dup(0xffffffffffffffff) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r4}) mq_timedsend(0xffffffffffffffff, &(0x7f00000002c0)="a092f35dc6f03e861811a662c212d6aed8a60c76bc37f9bc4b4988e08ecf43df71037b8ccaf31504ca8061cfc879488fdf72a3ad1a2a73a92826840325c902bf107ebdf15b4d349c6026f02e70e65ab3c214299d60a0a515c2d880debc23befa092a211a80ab28aa93e172aaeeb939491e3673809dbebdf61468a2d00d8752444a3cb891a82f064c8a28fd5f81e41283d68d4434724dd63074623dc58a4bc6d5418e19319a50494be4d732f894635e202aef1cfcd2cce098d8583e75ca7fd33d", 0xc0, 0x100000001, &(0x7f0000000000)={0x0, 0x3938700}) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:59 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:04:59 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:59 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00U\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:59 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:04:59 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00Y\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:59 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:04:59 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) fallocate(r3, 0x70, 0x8, 0x2) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:59 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00V\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:59 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:59 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00Z\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:04:59 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:00 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00W\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:00 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000200000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:00 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:00 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x8001, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f00000002c0)="d0594ad932bb146751e93ce94474417aa3e0d911b9cc069d38ffa1c08b0a38418d447919ccfa9d7b3692d1dc1a86c2fabcac1758d4a349c5683b14c8f519cf68a291b162c255f3f3b07560b6b83741d478fc066e1ae87d034c4c5691e87862f3d1f7cf75e515eba2cfb9ce31487fe51cb642ee9411", 0x75) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = dup(0xffffffffffffffff) getsockname$packet(r3, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFIO_CHECK_EXTENSION(r3, 0x3b65, 0x5) r4 = open(&(0x7f0000000500)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0xb3d7a3e39d3c33f7, 0x20) sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x58, 0x1, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x7}, [@NFTA_TABLE_HANDLE={0x62, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x40}, 0x4040070) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32=r4]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:00 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:00 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00[\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:00 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00X\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:00 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000000100", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:00 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x408040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000006ee95f0000002dbce21d", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:00 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:00 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00Y\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:00 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\\\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:00 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000000200", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:00 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:00 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = dup(0xffffffffffffffff) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r4}) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="2d46d987406ad05c1354b35834a61cd6ddf2e5a99c074c53866034be0b1c4986b17157e2645ff5aef6ed44addb393f45c4bda67a96aee8db3a024f06fbc3586f3649ddfe6a6214ad99cbb778538bdbd1b8b6aee4b5150e628465584cfc5d30dbfca0ffc183f494f5b894902594c7bf4f5881331f8dc8353d0f3884df3504b48b0cbcafba663f9d0cf92575de47c5d5a65a9c38843eac5af96de82a6de86767984e79ed24066525f719e6af0d943be54746c52fae8b4278415f92b60e908aa66e"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:00 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00Z\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:00 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:00 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:00 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00]\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:00 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_getrule={0x1c, 0x22, 0x300, 0x70bd2a, 0x25dfdbfd, {0x2, 0x20, 0xb0, 0x45, 0x7, 0x0, 0x0, 0x1, 0x5}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x44001) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:00 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00[\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:01 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:01 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:01 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00^\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:01 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\\\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:01 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:01 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:01 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) removexattr(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000000)=@random={'os2.', '\x00'}) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) bind(0xffffffffffffffff, &(0x7f0000000340)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:01 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00]\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:01 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000002000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:01 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000025f00000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:01 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:01 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:01 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00^\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:01 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000000001", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:01 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:01 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:01 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000000200000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:01 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f02000000000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:01 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:01 executing program 0: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) socketpair$unix(0x1, 0x0, 0x0, 0x0) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xd) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3f5) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:01 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000000002", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:01 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:02 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000000300000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:02 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:02 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000805, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000a8a000)) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140), 0x0) preadv(r3, &(0x7f00000017c0), 0x3da, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x309000, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r4, 0x808c563d, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:05:02 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000001000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:02 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:02 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:02 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000000400000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:02 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000002000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:02 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:02 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:02 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000000500000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:02 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000000001", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:02 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, 0x0, 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:02 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:02 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:02 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$VIDIOC_DQEVENT(r5, 0x80885659, &(0x7f00000002c0)={0x0, @ctrl={0x0, 0x0, @value64}}) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:02 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000020000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:02 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:02 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000000600000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:02 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:02 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:03 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:03 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:03 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:03 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:03 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) r3 = dup(0xffffffffffffffff) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r4}) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'caif0\x00', {}, 0x7fff}) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0}, 0x0, 0x685b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000200000000000000000005f00000000000000ea925b9e170a92b345a795e2a31eab4e5abeeb2d37e073ee9fd0442ff2078d74a6a612ae42a82edef74c20145e", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:03 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:03 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:03 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00020000000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:03 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:03 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000010000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:03 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:03 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)={r0}) open(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = dup(0xffffffffffffffff) getsockname$packet(r3, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:03 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:03 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd00"/43], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:03 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd00"/43], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:03 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:03 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) readahead(r4, 0x7f, 0x8) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000e00005f00000000000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:03 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd00"/43], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:03 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000020000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:03 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:03 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d0020000"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:03 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x400, 0xed}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000000)={0x3, 0x0, [0x0, 0x0, 0x0]}) 02:05:03 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d0020000"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:03 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:03 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:04 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:04 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d0020000"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:04 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000000200", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:04 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)={0x1, [0x0]}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000000)={r3}, &(0x7f00000000c0)=0x8) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:04 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:04 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d00200"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:04 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:04 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:04 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'macsec0\x00', 0x2}, 0x18) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:04 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d00200"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:04 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:04 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d00200"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:04 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:04 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:04 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:04 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x83, 0x8c500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff, 0x73e}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:04 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000200000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:04 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:04 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:04 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="436547d2509fd9f88ddfefbd2eb06547bb93be6b8ecf66e76f90cdfe0f7cab871c8f4817e9a0f7d9400c534bc8e0f44546647f08bdf13dbebdab406e50311650a7f2a8c2a9c8"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:04 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:04 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000000100", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:04 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:05 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c80300"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:05 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:05 executing program 0: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x800, 0x9, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x10) r3 = dup(0xffffffffffffffff) getsockname$packet(r3, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000300)=ANY=[@ANYBLOB="000000000000000000000000000000005f000000000000007cae73030bc6267bca1fe357837bc3d082dc50556130f55d29a7f792d9adaf7c3c05bba50435fb08000000000000009ed41612e182b3b2cbec25f8cf05682ea9b1db2d0d7e48f79690bd7094525d8f96f4d5864cb09d3695247af441e7027d09a2e38d4067b83c1c4c03f747800891391c6963d89ee4ce677e17e7ee279182773a22271810b4662efdd38b1d76eac7bbf68beb47b5094e874fa070076ee6cc3c86b93b3106bba313cc43bc2862d78457eb9e11e3b4b88bbaa4", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:05 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000000200", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:05 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c80300"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:05 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = dup(0xffffffffffffffff) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r4}) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="18df25080003000100000001000000000000000000314045fb16751c7e54a91090c088460dbb4a9110e86e82f3d7ce3d125d32bba83ce277e22d545072a0e1c407b17a4165705e04d342e0d9fbe5bfbf8d920b525b133e4cfa98f260f6086c571fdb68804bb68974caa46ae8000000fb742d4ffe4eaa4b66ce4cde18dbf62332c9108327a260fa2341f7700c1369cbac6ef1b9e70617ef0b92e08616f80159d741f9ccf59c915585212978f03ae3e7171bff643448d83c848a31d1"], 0x18}, 0x1, 0x0, 0x0, 0x24008820}, 0x40) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:05 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000000e00000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:05 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:05 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c80300"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:05 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:05 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:05 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000000002", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:05 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r5) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file1\x00', 0x4, 0x5, &(0x7f0000001500)=[{&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="3e3a6eafb01aa691bb5e5fc50cdd10d7cd0f083821685b66b8e337b7842bfc71f4bb804d5006b7f2ae7707238c366afd77cacd49f0023030c8ef3522def92e815505bb2c9211a7d4cf195195fa9fe0cb2e0151b1da9d6e096aa3b9eb7cda3a7525e32fe7c4c44354192f3b7f5093479d05f76ec873f92e24e2968625bcfccc89b3214afbe278dda362", 0x89, 0x20}, {&(0x7f0000001380)="3eb339db85b8eee45f6a248fbd48ef201436d815d0b3380c34f32ad228eb639bcd0561ea01d1e345e8ba4650540e68c6601e96b73b4dc7b0210e0d3a31406c9847e8d174c146f43480713531efad15a6e1a26af8c64ed64beefb6785b39e1087e346646440e8b4f0cf5b1912ca6416b3a39ec3d7b209bdb5905e426c3f04ce4c43627a4ad1", 0x85}, {&(0x7f0000001440)="bc9d5f2a78da0921d1c67f3d2e911439a49f5cecf07b1679fca3288120d5b7c8be7695075cd967ab1b0c71cfad8fa03e2ca022f55da4b609ba968f7cd55b569ec2944a83fc8db2b24570670ef06c2a42b1b8dede1678748e", 0x58, 0xfffffffffffffff7}, {&(0x7f00000014c0)="10272a5471ac", 0x6, 0x7}], 0x480c0, &(0x7f00000016c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-3'}}, {@utf8no='utf8=0'}, {@shortname_win95='shortname=win95'}, {@numtail='nonumtail=0'}], [{@euid_eq={'euid'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@euid_eq={'euid'}}, {@measure='measure'}, {@euid_eq={'euid'}}, {@smackfsfloor={'smackfsfloor'}}, {@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r5}}, {@dont_measure='dont_measure'}]}) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="d68b4cfe1178df1daae1"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:05 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000000f00000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:05 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:05 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:05 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:05 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:05 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = dup(0xffffffffffffffff) getsockname$packet(r3, 0x0, &(0x7f0000000140)) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000002c0)={@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x3, {0xa, 0x4e20, 0x1000, @mcast2, 0x10001}}}, {&(0x7f0000000000)=""/51, 0x33}, &(0x7f0000000080), 0x43}, 0xa0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000000000000000005f0000000000000092", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:05 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:05 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:06 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000001000000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:06 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:06 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="037bcd00bfb8d2b0fcf68a0e645f050d70c17ffc95e2006666bdddabfae95e7ebe00992f249a32eecf6e63626d705294d4532156c3580c3d9f02c57beb"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:06 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:06 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:06 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:06 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000002000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:06 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000001100000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:06 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={[0x8]}, 0x0, &(0x7f0000000100)={r0, r1+60000000}, 0x8) mkdir(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) socketpair$unix(0x1, 0x0, 0x0, 0x0) r5 = dup(0xffffffffffffffff) getsockname$packet(r5, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r7, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:06 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x10, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:06 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x10, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:06 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:06 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x10, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:06 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000000001", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:06 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000001200000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:06 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:06 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:06 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000000002", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:06 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:07 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:07 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000004e000000feff9645b3920000", @ANYRES32, @ANYBLOB]) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x24502, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:07 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) sendmsg$unix(r0, &(0x7f0000000000)={&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000003680)=[{&(0x7f0000000280)="59bce47c3e40065e4303503fb936d972ac7014fc78001694446247b80e67b53082dd29aaf1ac82b18ba390c2217ab22fedb787c06955e4a4cc4420b2b8e43d9c8a9344dc7b32d06683b0f9d9a520de5f27412940ffa8888cf66950ddcb22f5e27841b3d5565af9ad4aa80f7cb8f48b80a49ed0bccaa99340ac75550a144b082f968d23357b495639a9ccf831c290f342a5263798", 0x94}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="7e670aa063fdb31456d997fef85d3c49a1b680c415060944b7728d7a904c3c691584be58e4470f85a7bcb5feb210eaac878e54e86088fc2fc43d54e81db2749325011391371c608ecdc16b717952e91a522ab09ecf6fbb768fa12ca98c8ec7848b3ae384208fa38dcd4e6fa91170849886c3fadee565fc8563aca25727fc2a6ff11a34e74ef99e1a160cd254dd8553619691b64c5dcdb205754b11dbf65f415a2dc839950e413e77d4c5ff9b83c747be97821aa36060bfe264d233af3c586e9ec5bb518300a78011c6f7881d3b8976ad6001e2f1b79353aedb4760efcade5c86366e51a5f59a109cc15485d449dc509074c4", 0xf2}, {&(0x7f0000001440)="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", 0x1000}, {&(0x7f0000002440)="c44d9598348ad84fd4e57c1a2eb518e835bef4798fed24f41963249056616ed847f4ae3d628de872c553497a1ab1a93ba2a36930eee5125b39e51bdacf00ac699b9104f2d75ef78f3817c90f6972a8ab4a4458d9184a3af764e96601eff2b1ac9ec26d553c5d021f1b3090acd7b8ce63502320c2a91cc364e0cc9bc71271aafb6050c4825933ae8fcaee399b0d0d", 0x8e}, {&(0x7f0000002500)="2efed67fa2a7089d0ef8254e44f23131431d96fa7b776a91d2da35ca3bdf4258a0322418b2f3d41c2b7f4511e2d14fa86327ce782266bd54bea515ec81972e84900ddcb181a70f3901b42f60b19db952860e69570620e73869482f08eac09a9aae50d7f355096a3f2bf9367e81a35c5586fb4ee88feab2e4f5fcb4537d0bd48d7204e6aedf524e5929f9a27100c67ddd46c419972f4b0bd65dbcd71d46fb95a77b52d7025d75139a96d63f3bbe85d2ddc2c754548cca9d79ba5ad6dc9dc97f4a215c5dbe7f92dd6476d9f2bd46f5caacd0364bd5e0d722519bd1b3fdab863f51bf9e14cafa1acdb6", 0xe8}, {&(0x7f0000002600)="b022d056daa90525b137ff3e7afd36bf1411dc9ba321362e44b5c1dcbc8fa1399a2575a27a228b9e8651449ba63b4fd3376a3aaed072078a3df7b9ef414e52e59c5179195da74cd5f8150dba392932dde58a86b067f047d55c42d41fe30ce81837fdeb344682e05527830a87a24ec92f1467d59675", 0x75}, {&(0x7f0000002680)="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", 0x1000}], 0x8}, 0x8811) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8040, 0x88) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:07 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000001300000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:07 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x0, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:07 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:07 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x0, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:07 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsu\x00', 0x0, 0x0) faccessat(r0, &(0x7f00000001c0)='./file0\x00', 0x3d, 0x400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0x402400) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000140)=@gcm_128={{0x303}, "b7be3b0607d7d20d", "45e5cd56ab2cc4dc4ddd8cfc01e2f886", "b18ad58d", "92e13a50c7955468"}, 0x28) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB="001b00000000000000000000000000005f000000000000003be08afe010e63651f091001145e55dbea12", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:07 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x0, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:07 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, 0x0, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:07 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:07 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000001400000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:07 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) splice(0xffffffffffffffff, &(0x7f0000000000)=0x3, r4, &(0x7f00000000c0)=0x4, 0x4, 0x3) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000008005f1d00001caa901d", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:07 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, 0x0, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:07 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x48842, 0x180) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000300)={0x0, 0x1, 0x4, 0x7ff, r4}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="6ffe000000000000000003000000400001800d0001007564703a73cc1d1e7c511d728183997a7ef71c9b"], 0x54}}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x9c, r3, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x81}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8b33}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffff}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x100}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffff00}]}, @TIPC_NLA_NODE={0x2c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x39}, @TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20008051}, 0x800) 02:05:07 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:07 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, 0x0, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:07 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x35) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/timer\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f00000002c0)=0x54) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000013000000005f00000000000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:07 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000001500000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 421.487782] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 421.518617] Enabling of bearer rejected, illegal name 02:05:08 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000020000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 421.554553] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 421.611918] Enabling of bearer rejected, illegal name 02:05:08 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:08 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r6}) ioctl$PPPIOCSFLAGS(r3, 0x40047459, &(0x7f0000000000)=0x100020) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000300000000000000005f00000000000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:08 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) r4 = accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x2710, @local}, 0x10, 0x0) ioctl$FIBMAP(r4, 0x1, &(0x7f00000000c0)=0x7) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:08 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000001600000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:08 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:08 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:08 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB="0003e8833d33454d000000fec09ac7e5e3cafd000000008d6cc62e86a8286c2b", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:08 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) r3 = dup3(r2, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r3, 0x40a85323, &(0x7f00000002c0)={{0xfb, 0x81}, 'port1\x00', 0xed, 0x80011, 0x80, 0x2, 0x1, 0x800, 0xfffff000, 0x0, 0x3, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}, 0x36}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x5, 0x100000000}, 0x0, 0x9a7, 0x0, 0x0, 0x0, 0x0, 0x80}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x9, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x121) 02:05:08 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 02:05:08 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000001700000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:08 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, 0x0) 02:05:08 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:08 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x2, 0x0, 0x0, 0x4, 0x0, 0x6, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r5}) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f00000000c0)={{0xa, 0x4e20, 0x7f, @mcast1, 0xc403}, {0xa, 0x4e20, 0x2, @remote, 0x1000}, 0xcb, [0x2, 0x2, 0x1a0c, 0x52c1abc, 0x228, 0x0, 0xdc0e, 0x5]}, 0x5c) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="09838abae1b5023b86c35c188402ce7e8cf000c162327f97e9ad366e3b84b0dc6530c2cf43d455dca3cc8c078c618e2efa57b7ea50c741e65119e4d16233185096c77eab46bf2c9b6add88636925f723dcdc509fd0a0b4fe70970b59c8955342a09f00"/114]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:08 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, 0x0) 02:05:09 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000001800000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:09 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='\xdb\xfdeme\xd7E\x84\xa4\tol\xc7\xc2f\x1c\xab\xbad\xcep0md?b\x00\x00\xbf]\xce\x0f#>+\xc8\x81\x8c\x1b\x04\xb4\xcc\xec+G\xe2%\x9e\x8e\x95\xd9\xcf\x95(Z\x98\xb4\x90\xd7\'\xcd\b\xf0\x8d\xd5\x11\xdb\x06\xce.(\x05\xac\x00W\x8c-\xf7\x85}\xeb\xb9\xc3N\x95\n\xb1\xd6\x96]4\x84\xb7\xec*a\xb3L\x9e\x16\xd6H\xd1}\x19\xa9\xf5]\xbb\xb2\x86\xee\x04_\xada\xd38\x1e\xc5\xdb+\xe2\xcb\xc0\x83\x1a\xff\xb5=\x1c\xcf\xe9\\\xf1U\xf4I\x15:\x93F>\xcc\x87\x1d\xb9|+\xaf\xa2K\x04\vu\x04\"j\x00\xd3\xc0\x92\xfc\xbf\xf4\xcb\xe7*Y\x83\xf6\a\xcfG\xe2J\xd7\xe3\xc8\x1f\x10\xf9\xd1\xb3\x98\xecL\xafe5zW\xea\x16\xaa\xaf\xb2\xd9\xd3g|)68\xe0\x04n\x12\x91K{n\xb9\xf1\x1d\x06S\xec\xbf', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="726177b2db12e35f98295a8561358ebd0000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c8"], 0x6) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, 0x0) 02:05:09 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:09 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x40) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000002740)={0x0, 0x401, 0xa, [0x4, 0x2, 0x449e, 0x80, 0x7, 0x7ff, 0x8, 0x2800, 0xffff, 0x4]}, 0x1c) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r5}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:09 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:09 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000001900000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:09 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x20000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) setuid(0x0) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)='9p\x00', 0x300010, &(0x7f00000005c0)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c74696d656f7530303030303030303030300080000000000000616973652c657569643c000000000000", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c736f6f74636f6e746578743d73797361646d5f752c646f6e745f61707072616973652c636f6e7465785e5f752c7365636c6162656c2c00000000000000000000000000000060a2915529801e508929a31c9f14a790949fc0e2296b8b8115ce854929bae9f921d68f0d095e7a23b6d235bdb1523bf0eceaede8c103d82a9ffe100869ea179f19f8a39e5628a477c673164024314baaaf99d937a40d4dd54a57fb497af2337d74c9cfe56c017ababb26cfab48618e492ffc250adda159bdc11d71333c0450d335a8324c37d416f6ab9cf12e04222e71bf2249014b6c3fcc9f8c4c1a105773c59b5e1db4dd843a8026211a0059879a0cadf1367c64aaa1d4d96cdda374c816a73a80a4a1ad76383080ddb6d05f92ad546c328e7216d3b5"]) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000400000000000000a95f00000100000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000080)={0x7e, 0x0, [0x80c0000103, 0x0, 0x9e], [0xc1]}) 02:05:09 executing program 2: getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ah\x00'}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x84200, 0x0) semget$private(0x0, 0x0, 0x601) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge_slave_1\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 02:05:09 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) dup3(r0, r1, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80000, 0x0) recvfrom$packet(r4, &(0x7f0000000280)=""/137, 0x89, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000e200000000070000", @ANYRES32, @ANYBLOB="237dfcd16d8325c54cb525249063f54cdab4cf8c073b3a66b92f7e520d8dc962472c989c8d34284140a8e774614350d460ffbe70bb9550a08b"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:09 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:09 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000001a00000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:10 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000000200", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:10 executing program 2: getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ah\x00'}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x84200, 0x0) semget$private(0x0, 0x0, 0x601) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge_slave_1\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 02:05:10 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="c1fdb1f0ec1ee5d8368e53f8554cdefbb6d4ae46f1a1bfd2b863b3beb7f687b848e2e409cacece57b646d0b40f52b7f8b5d0a69888dcba5adc1e7e4af40b58839a83599692825059041906c8ce5df0c9d0fb83ca202f7666a2863c0e072e0bb240470782de8d1c0a02c6d230079d0c2f4cbfe47411c8ac6ac5793ebdefa5143243accad87a8460d15c9f321784f0973d1e101fd19b3aefbf40db45da8b1d93e3"], 0x2) r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="10262c927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf9091a7511bf746bec66ba", 0xfed4, 0x20c49a, 0x0, 0x27) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980700009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000008800000000000002726f7365300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000fb000000000000ecff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff0000000000000000000000000300000007000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000100000000000000000000000000000000ee00000000000000000000000000000000000000000000000000000000000000000000000000200000000000000500000000000400000000000000000000000000000070009000000000000000000000000000000000000000010020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0f1f23ca88dfb03a860f3354872f16a1241362a12f7e102659ffa0ae42ab7e0b88faa8bc790c8c2e38bdd45ba3fa2b2304b1e04dafe72a908c7091cc7a4a599fd00cef9f6757d32481473a1ec1ebcfcacd217c8d3176fa9094"], 0x1) 02:05:10 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000001b00000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:10 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:10 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f00000000c0)={0x8, 0xa, 0x4, 0x72181abc740fa6dd, 0x3, {r3, r4/1000+10000}, {0x5, 0xc, 0x1, 0x8, 0x3, 0x0, "262c1993"}, 0x8, 0x4, @userptr=0x8, 0x7f, 0x0, 0xffffffffffffffff}) r6 = openat$cgroup_ro(r1, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000380)=[@textreal={0x8, &(0x7f0000000300)="a3bd00f43e650f01d6e3ffbaf80c66b880a0938f66efbafc0c66ed0f20d86635200000000f22d8baf80c66b80897cc8566efbafc0c66b897693f4066ef6719292e0f01c9deef", 0x46}], 0x1, 0x4, &(0x7f00000003c0)=[@cstype0={0x4, 0xe}], 0x1) r7 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r7, 0xc0189436, &(0x7f00000004c0)=ANY=[@ANYBLOB="0000d300000000aa0000005f00000100ba00"/33, @ANYRES32=r5, @ANYRES32=r6]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xb0) 02:05:10 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r2, 0x0) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, r3, 0x100, 0x70bd2d, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x22}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20008000}, 0x20000801) sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000500)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000140)={0x14, r3, 0x400, 0x70bd2a, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x20000080}, 0x4048000) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r3, 0x0, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010101}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010101}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x44}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4890}, 0x4000) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:10 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000001c00000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 424.023554] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 02:05:10 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:10 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x9a6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:11 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:11 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000001d00000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:11 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:11 executing program 0: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000001880)={{0xffff, 0x0, 0x3, 0x1}, 'syz0\x00', 0x44}) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) socketpair$unix(0x1, 0x0, 0x0, 0x0) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, 0x0, &(0x7f0000000140)) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x1f, 0xa, &(0x7f0000001780)=[{&(0x7f00000002c0)="533edd0c7909507dd025531ccf99fd9f6f040a296b3979cca3cdecfe096c5ebd893720945e11ebed93023449e503455ae9bfc67f2c275f2cdfc96e031cc7da76214f9c18206bcfafe55f914fa8fd8b11f8592f671b83", 0x56, 0x2}, {&(0x7f0000000340)="158f191333a73e2db044e8177865d8d63d6f06704f6bac3c089362e93123da9357040bd17749b942f302f7ca09", 0x2d, 0x1}, {&(0x7f0000000380)="e447ce76f1436c85756726f7207e3a47748a3bee2fd3b7cb969fd00f79eeb893cfe7569bf7c1ac94102e1aa8f420e38d8afae608d7b8d0dbf97e959ebbbfd82ad4b01bd6ca55a5a922121588ac9c2b7793d96f6ab871533011f28c01b90b08748d57873072eb1c0c4cd594ac6e1bbaf3c9b78cd6f6f9c4fd30d1e7fe6d14184d0f7fdd546270a14aadfb3fe34aa15a734fa3aa7702abd2a2fa4d8bd68bedf71de823676a3afd453934542f17e2d2380ca947509b3c879a517ef9bc00cff12050e558ccf1c55a8e8bf5d97a25558ca7fafd26d3e9497c07cc9772df893121cbda8b929c4685c636046b255234dad263fa3d06b5a298abc04c62a50a1b261c272463f29830d5c3d3917ae102e6ddc22f9806da9e68035897de37885edbf14da715fe687518e496bacf5c10d9e0c1dd6a03b33ccdd3e2eec812e8fab91d70c22be62db442ce3927a7a519388b6ead88968a619766aaceadc07f0636a483e0e1bb22fe3119227d0acedd22bbb3ae0705a4ad5c2e2d8dcfae5c38175f781f552b61daf41bfa10f7625f7d1c4d0aff208630f17a4724883d20b15ef52d45f3c06ce42a04bd016bdd3441092d232cbc5c61dac30cb92681f687518799aacba010f2fe8a9899520ac8359a8ca9f55a613026445f2df1d1d641432ab4de11a8132fdd0e9a5b46286a63151fd4b8967c4ce7eeab02fb20f0ad3173593839b40bfb7934bb23c1bd33d2f0c48a89bb66c2d1f59c3e77c07c1304ff84a93222c989ff72efba88c86df6221c224c90142bb5736a0a61dabc3c96255cccad333434e71750c84db96f5f78d66644d8f935c28d11217b93a22fe6f735d031f1b13802287bfc0c7a7bd2300e57ee3a3336e72d2ec4021a292fad3a1f48f634d6647df3cb2d9dc0987494b2c9254f7c436c6632076d4038b8ecd4da23d1c9c73d58fbb2ecc6bef9b105a2951eefdde2cad4700ab6f28febe378037327b9dd316552fcba24e6c764d5681a94ea986d12949d5c2e563abccae5c742256f49048d33cb5e90f4c776487353df0a453447e38dd7af1df5f2b589505d3d06bd2b1635b71a22436c0739df0c9325628b2aab77ac8e8c69ccedceb141656a11596f598b160883776691c316ed23cf8c6dd85e8e109e0b9ceedf8c19e9b8af9b573f9e23efe302f4b4e69535e5ec6d58831ceb92d118588668c1eab3c28bbf2402108126913a9f3fdeb42d48a0f795c817ccf8a3c26b933ae9053d2ba58155719811af86196abe46081f12a92f2798235204dfb103327557d38d0a07c44cb06285ac14178f2b66204f782f6b1fe6a016a85df9706d579087209a4e5483139d0940ec9c9e62d00b158e96d34a0ee2a91c96a5c4ab0f870eb0682bec6c1132974721b947c94babfdd54dac651ea4d9e23c3666ac630a5019688f154da73aee9b03938354f9418305f510b55f9ab4551b3e729b5f573fe53d4f00c96914a2184c4be481b2fcfe4538580adcdfcc3cd9ffbd1c22a5f418bffdddd996b808751a14a063ae1b8842efb0b4b01ebc9ab345fed706ba55bdf7a7797f409cd54137e00d5d06b58f45cb0bcd6381e2f6a6d78348f2f6f3d50bb04ca06111d3506bc06073a8cc1751a1d6e5341d3a5bf4f8b46def4b93b434fc162d9674ba72297384ec642f48afd08ce438665d6f245557c133ac2838ecf0ec11c4eef43170f4c30e4ecd974c788eea22a659b8021da7c9cf5643ab612f26cfd44afd39d990b0fc7abc1dc9658cd99a108c7adadd06ec85e0a5e4606d70368a35b1dd04428de51e0b79b4060eff2ee9bc0602062f4e0efeacdd83baf270661fcdb28ebbe7a0a04312b7c843f850ccc5aa3c9f6135c82d3f7cbcad37e45193469a5b748f92c7a7c5947fff6e0620afd9bf7650f2a450df2b5c54255ad5aa91a960f10da5a766a70df8f14cbc031cf00dd71aebe687797be1d45d439888b22c3bd3587499504f94370c4195a162507eeb1433c407f3d4ea3d8f8fede0812ba56140e28223fcc675deb06309468b31d823e019214b5a4fa80f60f145e84b3442a2a53cbece1f59d818e38057af39b9138227b004cca85fb994bba317e464451c5155b5e043bd3f484c4a25c7dbbd11b53f3a93900558eb3ae02313df70cd453dddcd85e44e67e70eb0d190076a0d8188c5b59cd22d7d72f90404ab905c6307709b404c8d23a07ea2921249e6c4a68f0fc8efd8c71d51baebaf26bcd45ee8bcfbdb4cb8ec088d21343e711304cff02b1adff29730c13cf8e64c9e76bc35d5b284b929d9dfe007f2f71a19f858b8de29a3d32d65e71e5a06005b62132fbf5862742ff31569ebb0f08e1dfa21a928193bae2b810cb07e76301cd0110bffb1c3074496ab12119e9dabdd6058a430508f9cb4e751f1963341b9602924af3b0f00e0efd0cb5a9861e72f91e0f06d4e4b9ddb790dad729f40b11500af9c2b734ea20ec4c3cfc812159ff9cb79f52f4be4fcb5e7f2378ad21b9eb237fcba3a705b90f10dcc6dd1074a78825fbecd884227209ed1211633e35373bd3fcfe37eb93f57fd6e9a8aa391039e72360753d243dcd5f2f292419a058f40474772e955f547f3cd5fe312ed11a1ad02b7666b43853aebc2570c68c793c90f79a615e45674713f27b55090d09c734f2116f1c6527dcb34039c40c02bdf0e2e15f1a4f79db24b2944497186bb21cfbefb4913132b56270f24271e6c93769eb4dd300ad9a7588d79ad824986f59c43461df5b050107a06d172e0040cfb04b6ee7dd739b57dff05fb214614d95e973e9ae9c6591a706b3e2cf0eec7eab64020db6311653d3305d7fdca174d65220bf090454d0cf131cdd59f20fad8f794d005ea8a365a08e210cd10a11627d5baadcfe11390e85fc380fc8d6815ede58e1c619a2091c0af12708e5b6241775ed40202ad4bd522503b2df2f96a80964b8e6f39625707f1ab6bb7a722f244474722ddc2cf88949297b031b358a90c9a76a3f26a8ce8e3da794ab3537f28a025924c16fbb11d2978a6ecc181f3c8ec6bed62fd1ae648261b9c56afe1d2a49fdd8d4d4f808cd1a803eede6258db380c38494ed87389aaaa70cfe88a3fe30b0074d7599b04c0e91ca11ede7649b9948c74e1b7b7d83b2c6a93270c464fb8562c0adeebdb0ba9e697f1320e36dd2f9ff5737ac07cf2449a45296c492fc3a1a020e1dc53a2f11169800b87e65c1f12acf5985a16a08121ac155e17f0e291dde3b7a5eb09326eb1c8ea8ffe39329f69c48867196cedef88423cb4979ad381dd7c38e0477ef004912b01822efe5e0d6ad570eee9fd15b318adfa714ec38acf01bd2e4f5f5da40f332dd1fc20f74fb35c09e57cd21a3d7c7506844fcc080cc1a465757a6b7eed6bececa6b163bc71d3f2514ab65975a089b8f0ed0df6602c187f6262760f7e669b8c1c5079ede03385d3c537e17892dd8fc7d3439159e42555263a1b1f265bef8675401116b3552375013b17683c6a22ab7d66fe01f7924fb6706fe51d447d2b07fa511d30e6a4d77b525597ec36bdfa0a219a8a8f8ee4595f2178107b2e9b903bed8eae5954c3703fe8c8be8d7453f256ce41745ab3df74d5cc94f67c8ef659e69f165d666f91f6b404bee8c4a1efbf21eb88029f0cfd3e2ec1afd962c6b0aa87d84f9b562503d80072cb442297889ecc67a2913eb634d55cd78123d610f4eea5f865baeca21c9929f0fc9625e42f638f9a6988dade30c45f547331ba3680e91f8f05efe4124d04992aba535b0888df878b7eac56c3d34bcd3633c8a88b5b774ed48d133d4923522582fff9ad057fb8c9f3930dfbe4a4875577180d7e045655ac185c66db428a977eff33d492c218c57c6e591b8b6067a9a29da160a9b45266d3c8a7dfa5edb914437f5cdad2804298114f206cba869585aa20f233243a853d86dbca9e796df13d35972eb15ac9070e19e698fe7e41de02544ae83d96e61057b23febe292382a292d6a5909d73446cf941209aa8472b5e1af0a31c8c6b07dfb6808837934ad42db6dcdb623532342a2ef221e7808a055c77aa192ac21763979af36e8ae18251253e809cd197eecb1760f520ec4d2dc84ad770da7a2812e169d145884f9871311d02d24dddb4a26246f7161ccba867fe6cee116639b9adaf98c71b38c00db5422e1b5a3a622b1a5a00f8ffccfff6201d3f354e3b04f580ba98febf7c4902ef23457e35f5c94df9841d2cab39dab32e34e4c3ce474ad4010b084b268150a7f47d23b9bf4e757b91e55dc1ec4b5b5d50519d193a5e1d3ea51e6de242da099599aba1a596f57d3abb61715055a1f5bf85d9346636fb34dd7b6b98e845af7aeb2d36454049061507a0109bbd5193eecda2588e0999d4f774e555f4dcae6303a90294a313405a11efe84aa871d039312081907a2fce6dd3252efb37e907dd177cdcb1194af4260202174689048f1aa4261f89ae8207dff49a87446981626af753364d339b235f56c4371ee38899c5a240584523f92ddfd40a1fbd1ac48c1fc23e08958e740ac5a86322378c5f41344cbb60f2a7eb936c67c33a6944608f5b6bba17e9bfce3517ad633886e3929557f9e6e5fb693ac579016cb5f826161d0a281be7fe8e877f637cfb6c8f0381030156bce53939f71cfbc8fe21596a3b1acd7f3fef9583f54939f8fd86909b0d2b83b9b7efe211091727cd6d7010bc32d62c0fa9d82f4114596444610f07c35fcde76820f197c07f1a5f10b05cc67dd847df8e3d99339cc60f67722f790ed719dea52eac026aff5512638c65884c13163e7a20c7ff9563c392a9738fb59fecd64297c4fb8acce66de9780f60631cc1ad033d33d7b8b21c8527a86d67dee44dbab1fd034e8e9458243e3febc1cc16c57400c158fd2485fbf0d48015163e49dc0cf663905c33550d288d3597cfc6c9c28fbdcc25df1c863128787504469e51da49817b98898262c12098bf3fc054a258291ae4e06b28030e4b78a32db3defcff3c22e8b2800a54ec9feda91d2a9af5561eb9d31f0c0f135484218f26e358325269f81ab39f4d1edac2204e2f79b82f8f4a79648698db255056fee075c6f19d4d576ca0df3deeccf30f5ba438457c1742e9d12e9f6cae15418fbd9fdaa295ba985a13932cee8f364cd7242c96173de6f129f3d84ac847b410864a8fae37c7099c78c83439a6a1240baaced786eeeb4e783285cd82e221d00d2f640e8faf70feda2330e1fae62046cbb65a2f1d42cdd3b0ec1db59615d321a7987e501fd40c748895ad41e1ea8daea5ca6eb7a534016632e3ea0de07d0d4ca0015e8f37bf064fde41aa61f23558bb0848f87d0f8b9af7d33ca488decec6b5fde48fff8376df383ae1fecd3548b04bfc2c2b5cad4d60f9b18b4bf516bb2588c8f765960c3f5227449753068e800ea6fee7f09942515cac92e1b563c4cb88fced1fd9cdb168009bc21492635b7c94446025c0005d2bcf17a36a6184ccc73c6d546272d8af94d47f9845fb37db8495e80c5e7b869e0c0c0fe5a31792d31c84133b86011d1a2cb7c8e41cadad903aaa68bd37be17ed1e58733c6294d7ee11d5e248550f133895f6aeae4619edfe7489f24f278e74beec75eec71202cf2f9419cd0ccb1ddc5e965194ed9f914c61a870c286ba0c0ab5a8102f8ac71fde09d17ff1724873d2376ac3fe4c757baef97b39f3aa89795defaadbd7fcd17ede39baf765303fe165e4ee7fe8b29539b7c75d632eea3c147bc14f8da4ac3bb357ba59cebc4cd0bc3062db874cf6a7feec414a0022b1462d0d55d30914b7026378d5ab063fdf776d04efe0a336e6245d4ded573e4a2", 0x1000, 0x75}, {&(0x7f0000001380)="cf982de837f928fe8c8edc43c18ce53d6431414d71c190d321b8ff34a9a2a9e52191a43ea97ea7c3ddd9279f63e5e69edbdcb32102b5ed55bd43086c25c37135d8134466b500abfbc1823deeebba", 0x4e, 0x80000000}, {&(0x7f0000001400)="194094768b4ad39988f64b95a9c89cb720cc7592754971e38eab52fadbeda669420e7b3f38c7d42bed167dc14b96c9158d149aa427ca1bc9852fb4974ab057b9c412ffac122b94c20c242fe912b4b47131e98090d5099a5fb3dc379b469f1b31b8a6efea8a2c220c4c05adfcd9a8f0ab7688c344fcdb4164a598d953248087476ab8861646441ba20d0b5df695e96a", 0x8f, 0x100}, {&(0x7f00000014c0)="6516465be2e561e78d7f47c808ae886638aad3c1cb41d2c2ebd7552806d3e454ab3aa2ecb8ecf7bbeab35663b3525da49afcb59cf3a6fe51072d817cf5571eec1f158a79a428196d26cd72ff3c692d1401f418296bb1d187ebf299598976e1e5bb5c0eca0daafc0307fcc654fadf66f004c3dd03b423", 0x76, 0x4}, {&(0x7f0000001540)="d34358f93b7403de0749629fd93556523647cb1507d884c31c205fca53e01d0ab55616f6c8ef806cf1219c906e936b89affde2f3d2ad95b5a9d4dd0ab546890b7c157923ab031731b1d9a6e919356e5834f60c7fdfce30dde26fe8e3956bd84fa47afc0661cbc884e6d05c4b36341dc6ffd4edd5a278776b2397accea8dbfcc38628e3fac8faf4aa3424139ad5db51f98341fa8d53f9e10a593964e6a3dd95af0639b2bad3264897fd2f758432936a21e11da80fe1b64889a3b0c4c6adb9841b2721c8", 0xc3, 0x1}, {&(0x7f0000001640)="d802dfac86a38e1257a3e429072611e3f61c710a6fd88f59d5d3ee9c4f53a9e4dd8b79ba2e022fb55389f60106d3fa8f96d8091686c4a35435042a7576b476546e47fe37657c297a8adfb3ac5dae0d407900d4ba381ce6a7f1bafa8679366c9c1d5d12ac8157430da8732b130a63a238ee1d9e2bd1d3df169d706f40ade0ce69fa735fababb7c91784b7d2daa91d84120bf75ed4a4a024cf68138322165e4dfb5d70e6da5c00"/179, 0xb3, 0x6}, {&(0x7f0000001700)="c327c2dc5bbece54ed275748350729b10ca95ea655fd1a66b15b94e3f5d6c5ef4081268bf10bd58e68c2d21386b768d0fff088a9a6fe48779045", 0x3a, 0x12200}, {&(0x7f0000001740)="7c4cc300c837ca2fd3827e56b3a7f8110f0a24c9a1dafd08a459b2", 0x1b, 0x98f}], 0x20d00b, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x9a7, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time_for_children\x00') ioctl$NS_GET_NSTYPE(r5, 0xb703, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f0000001900)=ANY=[@ANYRESHEX=r1, @ANYRES32, @ANYRESDEC=r4]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x8000}, 0x4) lseek(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000ff0ffc)=0x8000000000004, 0x9c) sendto$inet(r1, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20}, 0x33) 02:05:12 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:12 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x20000, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:12 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000001e00000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:12 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x5, 0x0}, 0x4e}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:12 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = gettid() sched_getscheduler(r3) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e23, 0x36, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x3}, {0xa, 0x4e24, 0x80, @private2={0xfc, 0x2, [], 0x1}}, 0xfffb, [0x6, 0x4d0, 0xff, 0x4, 0x80, 0x0, 0x8, 0x1]}, 0x5c) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) setrlimit(0xd, &(0x7f0000000000)={0x1, 0x100000000}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000069734b1e75bd0ba00000f385a3ba90f7fa2d59d14b00", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:12 executing program 0: open(&(0x7f0000000280)='.\x00', 0x22000, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x7, 0xffffffffffffff00}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="9e09a2357b52cfa4337095e6220e6139b49d83099f478a9173ea9c69f98134246cd8297a4125a50258efea6bacb4e73e548900997d61117febd07f6a59867cbaa341bf"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 425.912028] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:05:12 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00!\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:12 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 425.981469] IPv4: Oversized IP packet from 127.0.0.1 [ 425.987673] IPv4: Oversized IP packet from 127.0.0.1 [ 426.072821] IPv4: Oversized IP packet from 127.0.0.1 [ 426.078480] IPv4: Oversized IP packet from 127.0.0.1 02:05:12 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB="008a875485a040ca505780a4f737ef4178000000000000004000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:12 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r5}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x4, 0x1450, 0xffffffff, 0x280, 0x0, 0x280, 0xffffffff, 0xffffffff, 0x1380, 0x1380, 0x1380, 0xffffffff, 0x4, &(0x7f0000000000), {[{{@uncond, 0x0, 0x140, 0x168, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv6=@empty, @ipv6=@local, @ipv6=@private1, @ipv4=@private=0xa010101, 0x23}}, @common=@ah={{0x30, 'ah\x00'}, {[0x4d6, 0x4d4], 0x401, 0x4, 0x1}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x8001, 0x7f}}}, {{@ipv6={@rand_addr=' \x01\x00', @dev={0xfe, 0x80, [], 0x23}, [0xffffff00], [0xffffffff, 0xff0000ff, 0x0, 0xffffffff], 'erspan0\x00', 'veth0_to_batadv\x00', {}, {0xff}, 0x21, 0x16, 0x0, 0x40}, 0x0, 0xa8, 0x118}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0xfffffe01, 0xa468, 0x5, 0x0, 0x0, "e392654ffbd7715330a0e3fd34f3a081e07a7998cba38cf2a909dfdbbbfcae7247a4f7b8111b64a90746d0f1def44b66edd5f0daa6ea7f39d31ab982d8cb498a"}}}, {{@ipv6={@local, @private0={0xfc, 0x0, [], 0x1}, [0xff, 0x0, 0xffffff00, 0xffffffff], [0x0, 0xff, 0xffffffff, 0xffffff00], 'macvlan1\x00', '\x00', {}, {0xff}, 0x2b, 0x1f, 0x3, 0x8}, 0x0, 0x10d8, 0x1100, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x1, 0x1, 0x1, 0x1, './cgroup.net/syz1\x00', 0x20, {0x1}}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x14b0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:12 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) socket$alg(0x26, 0x5, 0x0) link(0x0, &(0x7f0000000100)='./file1\x00') dup(0xffffffffffffffff) open(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) getpid() 02:05:12 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\"\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:12 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000000002", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 426.317314] x_tables: duplicate underflow at hook 2 [ 426.393659] x_tables: duplicate underflow at hook 2 02:05:13 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket(0x1b, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="36bb311452994be4a8000000", @ANYRES16=r3, @ANYBLOB="04002dbd7000ffdbdf0000005c003300010000000a000900000000000000000008003b0003000000c47faa7210ad57e6f7f1d2d544b99a4aaacdff11e16c0ebaea30e8607d128b9e8725e053f6bc5de86d1f2b10c18dab20ffffff7f00000000d20120ac143b0000"], 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x40040) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000180)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r3, 0x4, 0x70bd2d, 0x25dfdbfb}, 0x14}}, 0x800) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000280)={0x0, 0x5a9a}, 0x8) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:13 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f00000000c0)=ANY=[@ANYBLOB="cdf24c1ce2e7af86f8c4d1aba34a27000000000000000000000000000000005f00000000000000287e6d53adcf25bf8c6905662baa525857ab87a44c3231242dce13cd201b572bc2584006b4", @ANYRES32, @ANYBLOB]) r4 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r4, &(0x7f0000ffc000/0x4000)=nil, 0x5000) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:13 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:13 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:13 executing program 4: r0 = open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ptrace$peekuser(0x3, r1, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @local}, 0x35}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000c70000000000008ceb684f99e3000000005f000000040000009c27a52b4a1c228402fb6bc8f42db84554cfac762ed03c37bcceb3a183584fc3a8b4312e76cff0d5a71068", @ANYRES32, @ANYBLOB]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r6 = accept$nfc_llcp(r5, &(0x7f00000001c0), &(0x7f0000000240)=0x60) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x100000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@privport='privport'}, {@cache_mmap='cache=mmap'}, {@loose='loose'}, {@version_L='version=9p2000.L'}, {@debug={'debug', 0x3d, 0x2}}], [{@permit_directio='permit_directio'}]}}) 02:05:13 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getitimer(0x1, &(0x7f0000000000)) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:13 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 02:05:13 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00$\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:13 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:13 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000100)={0x80000000, 0x8, 0x4, 0x70000, 0x4, {}, {0x1, 0x0, 0x9, 0x5, 0x80, 0x7, "5ef44702"}, 0x81, 0x1, @planes=&(0x7f0000000000)={0x20, 0xffff, @fd=r3, 0x8}, 0x401, 0x0, 0xffffffffffffffff}) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r4, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x64, 0x140f, 0x10, 0x70bd2d, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x7, 0x45, 'cm\x00'}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xc, 0x45, 'rdma_cm\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x9, 0x45, 'umad\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xa, 0x45, 'ipoib\x00'}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000}, 0x20040040) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="c8a961d4834c371ba40d5ae58b0b1907c8453f4f92d04fcabc22f80e16a95b721d73d35eb7d196b7d9cfb790c57779f2b3a35d52816d9c8a29d943a2000024f5000000000000000000000000000000000000009c3b74ac6de61f7154fcc98e1709708025a9bf6bbaf820cf05eb31868850856b7a5251ee9ffe0ac1606a3f276eb46534a540de6880cc8ea45b17935bca85acbdcfc99a5ef0ef45822914dac3954419a4643b47693013e7"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:13 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = dup(0xffffffffffffffff) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r4}) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="86df41090230a5711d13161a1c0704d4d055a6c1ced07d08cd9b86448e39840000b9aacf9a9f2b6de26300"/55]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:13 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00%\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:13 executing program 2: mlockall(0x3) shmat(0x0, &(0x7f0000fec000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f00000d4000/0x6000)=nil, 0x4000) 02:05:13 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:14 executing program 4: open(0x0, 0xc0180, 0x20) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = dup(0xffffffffffffffff) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000100)=0x80) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000280)={@private=0xa010101, @private=0xa010101}, 0xc) socket$inet6(0xa, 0xa, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$RNDZAPENTCNT(r5, 0x5204, &(0x7f0000000000)=0x6) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="650cfa1413d300b13985120eb1809935ce050b56edafa09bd9b0779e67c7f2fdccfba818023b225b40e9ff6db3a8cb2e857b22d3b14ef85dda92a40b37fa6806c8e0b7ea040000005abd7c33318c90aa538e3ba1eadb1c4ae20aa2d3fc2eb4f207db2ebaab737894a306b6d1fb66b7f7bd1428d2a1e2ad28cdf8b6e58bccac20b77c951470d409e9b3403a8ea506a56ff08262cf5e510f"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:14 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:14 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:14 executing program 0: r0 = dup(0xffffffffffffffff) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r1}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f00000002c0)={0x1, 0x8, 0x1}) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) socketpair$unix(0x1, 0x0, 0x0, 0x0) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:14 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:14 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in, @in6=@empty}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000500)=0xe8) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r5}) statx(r2, &(0x7f0000000540)='./file0\x00', 0x800, 0x4, &(0x7f0000000580)) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000000240)="e5e4f2a93b855a44903eb18b87e74adf3a3aa7f66f9bb6fccc051312a26ee3b040d2621975885c103e7b491759c7144efffaf2f95c60ec4b2d3f8b5191a34e4c0f614e0352f7d1b0e4c5f4310ae68aba8f593701bfd997df03f46d80b66b509d2615187aab026c76b3a0174e35225d30610a122cbf5ab348f03cad391813d91bddb2eb97a48ab4865efedcf95224838d301b758f555654ab8c7cf1973a18b956474ca35eb4fab1890fbcff3e52709eaa1d23fbf575ca3b2f3cedaae88e930b29a4464a8ee5256f2c42ace27d67229e595146", 0xfa, 0x400}, {&(0x7f0000000140)="43681f3ccb6e8e4e01694277a89808007ff82e7619fc4d598854c8e46110ec0295c31fa83690604602e81c42f40af645", 0x30, 0x200000006e}, {&(0x7f0000000340)="b170eb0158097e9ee58e8623dd7ed5989255c67627435715838a0dc181acecc209a5da8e13f83e25bb0b5283dd7f632ee6b922b859847633654f8986aa586f7317ed8ecc495f2db0166da41771ee13c5a90ac5657e9c96cc71ede317af1f28ae6e9e57e8f975edcef89f59cdd8c5f649bf3dfd6d13d6a463daac535c5148b7eb7e9bc919925812f0cd52d6bd12432a2610e4a25d4e98d2df47dab4", 0x9b, 0x5}], 0x800000, &(0x7f00000006c0)=ANY=[@ANYBLOB="f63962507814ca9c86ba5a6771c0fec4334017"]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) 02:05:14 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:14 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @loopback}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCSIFBR(r3, 0x8941, &(0x7f0000000000)=@get={0x1, &(0x7f0000000380)=""/251, 0x2}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="975dcb80501b747c1d66807d488ddd39a4e15884548a28b646734b9852d1ea9dabc3e4e490ea3d30e011b8194c7546bf7ddfd47419360c7a493c529d2a37271870c9fb7ba6fb99f079265738ad36d9f57779fab3e7823d976abd4fd9b3813550f2a8c04af485e0341ad240241ec4bb8103ca8fd4a3bf849bc8788c8b"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:14 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000380)={0x1, 0x3, 0x1000, 0xe1, &(0x7f0000000100)="f50c05c23f510c573635743285b987071aeb45044085f01456b17ac11369b32e5570ae6215265f8ca698a59180b7916a88c356c9b38356a4c0fa83bfd0d99afd48b3a0e5a7ae732edaf74c89e2cd98ab7455510afcdd307559e2631eee0e2208e31d69bf7c554186c7bc61347b3beb4038451ad0572a1eabffe6638428026caf2158f7eaf3d1d17e4d722fedd732c4aee84ce00574a51094b6881ce564eafd377103a4cdc68ec2104a40a9055f1015e0d4a8d715520e0eab9be595ecd7e9c2ac203f6a147a321c0219b5f3a54f74afdc3f578a49b40cb0601b31160c3c62e49c98", 0xf5, 0x0, &(0x7f0000000280)="8d716e8f0cddaa6403c76994011ef7e50022c700467e9db44395ff9f3b0f49011968d98b86b9f32c42df8ee7f60def706f50908c717d16fea03563660802b8883152fd472dba044fd43de8eb74966540af98fadb08cc933693fd5541f169afe99ea888575d6c81e81f4332347d7b67272e411ac5f52e0878edf076b5f8fea3478782eff7fa71b31b1f5bb4428fd531adc24c324c760715153123bce2aee53dcdb97d9ec81b2302be318bd5c97e1366d2720ef2c16153715b005fcd0c022229504c9f64392ae15de7000f9ae84a8f3125f91fce05e9caf7d5b98e34b4c9f958f2709d374cd101e37d91160d4063de721de569b4c494"}) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:14 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\'\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:15 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8d}, 0x0) r0 = getpid() sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000340), 0x1}, 0x0, 0x3, 0x20203, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x0, 0x2) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) creat(&(0x7f0000000100)='./bus\x00', 0x0) 02:05:15 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r7}) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, &(0x7f0000000100), &(0x7f00000002c0)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40100}, 0x0, 0xffffffffffffffff, r4, 0x0) r8 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r8, 0xc0189436, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="a1da2fc2e10b3b696e5348a39158a9dc37a6980bd3e0e925dcba85b223d9a602af6f35f77ee6c45fcb741b718349c8ed70948607da3c64d66332d048146b6eb157ffaee8c71a8ad0f2c3fc681d377e9def8cd450915e163916e1d43681eb91d6f820ef97ea743947a9f150f603522ae42abb0bf800ab4e72c0b3d220d25c7dd4"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:15 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = dup(0xffffffffffffffff) getsockname$packet(r3, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0xfffffffa, 0x0, 0x0, 0x0, 0x5, 0x2}, &(0x7f00000000c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="965db1453f98c0d7b9b04900689c7560995de4abda442f153ebbc74604edbcabf284ed1c1ef7910cd35c01131c1eff1d79c858e528782fa4cd4e65b0ba79281569168f6a38df8c08275191d598147430d46d00f11e76bfdc43bf6f36413a67231d4a4233127aa83baf0345f5dfbe6e6983a52c5e29ac70c04828542b1fb964bd99b3cdd76f02850063880b2ba6a407b7e9b7009ed99f6ebbe2"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:15 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@mcast2}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) lremovexattr(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000000)=@random={'os2.', 'proc\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) socket$caif_stream(0x25, 0x1, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000180)={0x5, 0xa7d, 0x669, 0x2, 0x1}) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:15 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00(\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:15 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r7}) setsockopt$inet_udp_int(r4, 0x11, 0x67, &(0x7f0000000000)=0x8000, 0x4) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r8, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 428.698788] audit: type=1804 audit(5885402715.242:61): pid=26894 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir525264360/syzkaller.kSpQAo/637/file0/bus" dev="loop2" ino=8 res=1 02:05:15 executing program 0: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="cdfa05eba93fb0005fd2000048c8dd"]) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 428.768146] audit: type=1804 audit(5885402715.292:62): pid=26907 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir525264360/syzkaller.kSpQAo/637/file0/bus" dev="loop2" ino=8 res=1 02:05:15 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:15 executing program 4: open(0x0, 0x0, 0x18) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7f, 0x6822, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="3a9950fa6a618e3175f890a03d03e3cd789746a87533c785d2890ab33d38"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000140)={0x4, 0x4, @name="f0d63f9b7eaf14146be1e5f8e750ee9738d79fce8987a952d99a2919ffe20e81"}) 02:05:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0x7}, 0x1da0}, 0x0, 0x8, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="8c", 0x1) dup(0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(0xffffffffffffffff, 0xc01064c7, &(0x7f00000000c0)={0x6, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) accept$alg(r2, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) [ 428.900699] audit: type=1804 audit(5885402715.342:63): pid=26914 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir525264360/syzkaller.kSpQAo/637/file0/bus" dev="loop2" ino=8 res=1 02:05:15 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$SIOCX25GSUBSCRIP(0xffffffffffffffff, 0x89e0, &(0x7f0000000380)={'syzkaller1\x00', 0x0, 0x9}) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'system.', '\x00'}, &(0x7f00000002c0)=""/122, 0x7a) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) write$P9_RSYMLINK(r4, &(0x7f0000000940)={0x14, 0x11, 0x1, {0x0, 0x1, 0x7}}, 0x14) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x84, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) sendmsg$inet6(r5, &(0x7f0000000900)={&(0x7f0000000100)={0xa, 0x4e21, 0x0, @ipv4={[], [], @rand_addr=0x2}, 0x740c}, 0x1c, &(0x7f00000005c0)=[{&(0x7f0000000480)="875db191ff928f31dbfd8af463079b0327cba1a006aa1a498a895ba26651abf045c304005cea0bca9e53a0bc7e10e443969c40286a175263fc80857d1e6415add614768fcf932443a89ecc54f41698b04db5dc3a2d46c2daacd96fdd0eb2b2dfdb6a01a5058a42640f943033cb3a8c71234193f3c73c13f86da7bdd0c591421dc740886449247b09dcc7a76ddfdb989b3f88b0b21b2cc4c0bbb1a16c873a302cd4d876a72c08ea25441b0aa22dc9e218c6a1d86326462d487e2c93b6e72004f599ebe07b3f0fac018bdca1a04b3ab844675b53ac79aedf022a45e33eff", 0xdd}, {&(0x7f0000000340)="4ed5c37a0784acdfd5aa334e362285cb9a80e69b491bfed8b58b8d2e2487ba6a4f597c86f49f3f428dc2746c92c891043c", 0x31}], 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="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"/751], 0x2d8}, 0x4000080) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000600)=ANY=[@ANYRESHEX=r4, @ANYRESOCT, @ANYBLOB="820bc10a23fc3dc06a26b44055865c569dd4"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x14, 0x17, 0x101, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_open_dev$dri(0x0, 0x0, 0x0) [ 429.111779] audit: type=1804 audit(5885402715.342:64): pid=26912 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir525264360/syzkaller.kSpQAo/637/file0/bus" dev="loop2" ino=8 res=1 02:05:15 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$KVM_GET_PIT(r3, 0xc048ae65, &(0x7f0000000100)) 02:05:15 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x800043fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ptrace(0x10, r1) waitid(0x0, 0x0, 0x0, 0x100000b, 0x0) 02:05:15 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000180)="bad75e693175ff4ccfc4", 0xff4a}, {&(0x7f0000000300)="76df8cfefa7ddac22dcfcf9e000ca94f344e4dd28a9ec9014befb0ea01a514ea8c7c66e5e88e77a778affc2a2030f7fbfa96fe6c14a0c75aee26637a81e3bcb693e7513645eb550c7adad4103ebae473f42372227fa39722490bdd9f2774cffe4bd03c9975ba4b0cc3d7c3788e745965108c630cc26d19369cc660d3ccbf2feaeb4603347ab0c8dd0fd14bd500000000000000", 0xffffffffffffffb6}], 0x1, 0xb) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=ANY=[@ANYBLOB="5800000024000b0fffffffff0000000000000000", @ANYRES32], 0x58}}, 0x0) close(r1) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="840000002a"], 0x1}}, 0x0) splice(r0, 0x0, r1, 0x0, 0xfffffffe, 0x0) 02:05:16 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000280)={{0x6c, @multicast2, 0x4e20, 0x3, 'lblc\x00', 0x1, 0x400000, 0x25}, {@remote, 0x4e21, 0x4, 0x6, 0x1, 0x50}}, 0x44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:16 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x480582, 0x4) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='em1\xb6ppp0vmnet1em1\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)={0x80000001, 0x7fff, 0x7, 0x0, 0x0, [{{}, 0x2}, {{r2}}, {{r5}}, {{r0}, 0x9}, {{r6}, 0x1}, {{r8}, 0x4}, {{r1}, 0x6}]}) r9 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r9, 0xc0189436, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="3c817f310f69865bd15e02bcdb1fcfcb1436d1b29251a154c9036c896663430f07722db68f75e631f82da23e7891e270e6cb0981923eb4ca5ed6290b9f72cfbe5f4bc3f810e72d9326a5e8eb2c289e829c6b4283f154dd5e8e12b62757de954cc38e3533"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:16 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @multicast1}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@void, @void, @eth={@random="5bbad9990d84", @local, @val, {@ipv4={0x800, @udp={{0x7, 0x4, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @multicast1, {[@generic={0x86, 0x8, "dba02274b15b"}]}}, {0x0, 0x0, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "6911845831ed97846837c6f11db6b95cd9d186db3258450ebc9759af1675171a", "c8bc9b2bcf8fa017d7b80890fcf652e5", {"0100008100", "c5073c000000009ae6bd0100"}}}}}}}}, 0x96) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 02:05:16 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00+\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:16 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x1, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x81c}, 0x8004) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:16 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r8}) sendmsg$nl_generic(r5, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000040)={&(0x7f00000002c0)={0x101c, 0x2f, 0x400, 0x70bd2c, 0x25dfdbfc, {0x1f}, [@generic="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", @typed={0x8, 0x25, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x101c}, 0x1, 0x0, 0x0, 0x4040050}, 0x20000881) 02:05:16 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00,\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:16 executing program 4: open(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000000)=0x2304) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) 02:05:16 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB="00db313504000000bade00878f76b3b7e317f40000001e000000000000185fe1ffffff000000fdbfa999802258fd647107b3e1091aa268682e99d38b12543d4fe013bf82624d4df65206e72a340b5184a86305f6488c3f4d", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:16 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:16 executing program 2: r0 = eventfd2(0xc9, 0x0) write$eventfd(r0, &(0x7f00000000c0)=0xfffffffffffffffb, 0x8) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141142, 0x0) ftruncate(r1, 0xec4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 02:05:16 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:16 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r2}) ioctl$SIOCX25GCALLUSERDATA(0xffffffffffffffff, 0x89e4, &(0x7f0000000280)={0x6c, "5829dbb76d0a8f050bf071c10628ea84858ba419eeacf5a916e30c805a670c4e17e7942c555a44ea02d253315f7439712b49c68cca086ff99c5e4f4f27f2d24943a51a5d5d123f9d27aa2ae0096cbc6ba5471eee06afddf86745a0296d47ec9235d501fe60458a6b6d72fbbc7deb6b3b5cc6de313c0a933818892f67ba5c1d30"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f00000001c0)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x1f, 0x3, 0x9) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000005f0000000000000000070000000000004cdb3c3f86e45491d5e97a4e1fb52ab3fe66338213732be1f0096559b0cb4bfb48271a3b43dbd27830235499216bd34ed8201bde5b052361b71aaa3024e57582a6939b226852e8a26ea3085c75805fc2ae3a4d71c4f32c187bd4d561bbf1d31f1af21eb72fcefe544997f0951bfbcffd6d64c0ed281da96225ec28f0b0dd239c071ef1a26e27de36", @ANYRES32, @ANYBLOB="37de"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:16 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYRESHEX=r4]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:17 executing program 0: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="0401000010000507000019001000000000000000", @ANYRES32=0x0, @ANYBLOB="210b020000400000880012800c0001006d6163766c616e0078000280640005800a000400ffffffffffff00000a0004000180c200000e00000a000400ffffffffffff00000a000400aaaaaaaaaaaa00000a000400aaaaaaaaaabb00000a000400aaaaaaaaaaaa00000a0004004806ea80e40300000a000400aaaaaaaa", @ANYRES32=0x0, @ANYBLOB="08002e000300000008001f00010000001400030000673200000000000000000000000000140012800900010076657468"], 0x104}}, 0x0) 02:05:17 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:17 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) open$dir(&(0x7f0000000000)='./file1\x00', 0x480, 0x0) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:17 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x2002, 0x0) sendmsg$kcm(r3, &(0x7f00000015c0)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000001c0)="f1a80061be5f4ed36271ceb405d857cef8ba140258e5", 0x16}, {&(0x7f0000000280)="13ff301b5afbc02ed9ed8a460e5dbb0870a1cf74ea387f86c3539801789fec65f186b934dd638233b2c7cbb5f11e51a3f7b47b35ab03271fc513160e7fd5b38bd9b1ca14891df4a7b30f3f412f52a71473e4cd1579c379c5d1676d07b632b98fcd89e7caed18da8d27a493db014cc73a0f82027e84d68a32ae922719d376b93aa8109e14214a026414db562bde7a1bd8b5128dc7e645927e36c19b707bd2e964fc80cb8547106bf339b52c8e524e80fab0382737c5a472409616297ac00e72", 0xbf}, {&(0x7f0000000340)="4e417bc3f4c832bb8130d2f2307dbfedb9b7506b9a46d99fcc7fb5dc9533495b94443cf387905a638bbec12b11e1a4232662f2028583e93bd35186969592cc102660da5603b383cf50a036d0c8e994c16a16a415e41b240602d0d2f49f4e", 0x5e}, {&(0x7f00000003c0)="e887e10df359763d840767524ad9a76c0f4afcdd99e595aa15d1b2ad9c8570e055a4bb19f2edc6dc099f1ff75f440285c740b67ec60f9a496f6aaf89e6f9c68f923fe9b7d12a8bb6561a3c9d9918d8f6beddf8ca3c05f19a16abffa1630fd3f51afa4534e17e932c35837b683157175d4deec10e0ea91445951824bb8a03812b28947b6fc964d070c4387e4f60f4617f2c1807deeb5d904bffbe92a91ca53f388d3294472bd475c009ac39f0ecf391e335488986d666e62c51f5bf2b90bb781e91c5a295dd66dfdf90319078ce69cb2d0b150a876c0d16c6dd0f0e5e15b57fced74d51baffe8018c08ec9416cdefd2bcd4b10eb4", 0xf4}, {&(0x7f00000004c0)="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", 0x1000}], 0x5, &(0x7f0000001540)=ANY=[@ANYBLOB="80000000000000000d010000ff01000096e6fd987f3fc0d9e35132d1c6d7843e7a4ca1c746433a5c0a6bf6cf6eeaeadebe9e27a066aa860783abeeb66470907163544845c278e1d42872257375741fad7213b868e1cdfd67177469134f2aa74b9b61e9d65d855d7cbfb4af8b7eda7906283a50c5f3a8b3ef6c047682af79b100"], 0x80}, 0x5) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000100)=0x1e) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000001600)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="d05788add321e279ecf71958e1379b6d6956819fbb1866e7742f390100000000000000dfda3ca0f1677c4c09399e53442b3423a9859f14fe578b0f1bf647b855b41c5a3bd857f394c76373f35a3a4d1c6c957dd050ba7f89cc06da8ce6aee9ecb5497e8c4bda8d6510ffed69"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:17 executing program 2: r0 = eventfd2(0xc9, 0x0) write$eventfd(r0, &(0x7f00000000c0)=0xfffffffffffffffb, 0x8) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141142, 0x0) ftruncate(r1, 0xec4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) [ 431.386226] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.0'. [ 431.411239] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 02:05:18 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000008000"/24, @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:18 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:18 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r6 = socket$inet6(0xa, 0x2, 0x0) dup(r6) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000002c0)={0x3ff, 0x0, 0x6, 0x0, 0x0, [{{r1}, 0x5}, {{}, 0x1}, {{r2}, 0x8}, {{r5}, 0x2}, {{r0}, 0xffffffffffff113d}, {{r6}, 0x3}]}) dup(r3) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12000, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r7, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:18 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="5800000024000705000000000000000000000008", @ANYRES32, @ANYBLOB="00000000ffffffff"], 0x3}}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd6e2bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d00800002800ff4d09ff5200000000000000fff7", @ANYRES32=r3], 0x2}}, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x14) r6 = socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r6, 0x0, 0x84ffde, 0x0) [ 431.883450] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27123 comm=syz-executor.0 02:05:18 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="3821ca4c80ebcb9b49ba8af642274e0318ea64729b9aef"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 431.986433] netlink: 2220 bytes leftover after parsing attributes in process `syz-executor.0'. 02:05:18 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:18 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockname(r4, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f0000000100)=0x80) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7, 0x0, 0x2, 0x2000000000000003}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'/24, @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:18 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) close(r0) 02:05:18 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:18 executing program 1: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x2) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="00b4489c31ef657b0000000000000000000000000000005f", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:19 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x001\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:19 executing program 2: socket$kcm(0xa, 0x3, 0x11) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="48000000140081fb7059ae08060c04000aff0f03000004000011000000006fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f", 0x48}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000010280)={0x0, 0x0, 0x0}, 0x0) 02:05:19 executing program 4: open(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000000)={0x21, 0x1e, 0x13, 0xd, 0x8, 0x800, 0x2, 0x130, 0xffffffffffffffff}) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="6052ef3e59831c041781551ba1c96e21f71ae6d8738ffd17c6adb0b0261a3d07aa7c4ecb700dcff5f744288356088bcf898ebb82e242328d519ae19531ebae8901000000a466f47d4a7f85699f08344fd64a03070e772b278ae87781cbbf6efb8ec9b938b83f85d2e3da2c6c9b7b62b2a4b3e8e182bb26d90753ce486844a8d3788621095af8b6b08a2b6e1f7c78b02f44f536a840f837a23c0f94044a33fd008688903589c5bb787202197597ea353a2ea178765e6580501a55243a3130b8237681e728e76a1d3639721f2e"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:19 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mkdirat(r5, &(0x7f0000000000)='./file0\x00', 0x107) [ 432.667563] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27172 comm=syz-executor.0 02:05:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x98, 0x118, 0x5, "5760f989294de20729a671d72f396b30bcb691d3b67f43a2d8f5f1b6fa14b193e00c59bb3867614b56c2f5d61597c9613e8fc341aa813b5a42aeb81f6f9bb8cbd0062f1a4dd827eca2d6fe61ee47da53b5f32f5e87c5ec3398aaab7794df6acb309ad4e41c3be96de81f3a10c4f3a8ab2057326a166fce8401432bd55a52b83fe0a1e608"}], 0x98}, 0x20048080) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe10, 0x0, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) [ 432.759646] netlink: 2220 bytes leftover after parsing attributes in process `syz-executor.0'. 02:05:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000005600)=""/102380, 0x18fec}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa378b25db4cb904e473730e55cff26d1b0e001d00090000005e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) recvmsg$kcm(r0, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x0) 02:05:19 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x28000, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f00000001c0), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000100)=0x4) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:19 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:19 executing program 1: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x535542, 0x1c2) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="ae5cff43e86809abf05f58000001daffbd2effff0700000000000000060000000000000007000000000000000b0000000800000076626f786e65743147504c00000000000200000000000000ff7f0000002f163aa60db086706a65d52e29ad93000000060000000000"], 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000c00000000000000005f000000000045f7", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r6, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xe}}, 0x10, r7}) accept$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) 02:05:19 executing program 2: bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000100)={0x5, 0xfffffffffffffd6d, 0x63, 0x8, 0x13, 0x2, 0x0, 0x6, 0x42584, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x4010, 0x1, 0x7, 0x5, 0x200, 0xffffffcc, 0x81}, r2, 0x7, r0, 0x2) r3 = socket$kcm(0xa, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890c, &(0x7f0000000000)) sendmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000180)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}, 0x2}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000440)="4d7f08321ddb8cba7ed7e49e4ffa78f0044095d35b1acff2e3e1b72b356861b8e10feeff52895e36ae3293961859f8e59d54a8be2ecfa51f8f7f9d0238731a289c4fb7d00c1ba56b566f307d182377338e57cf8b34a3c50533e2af9f3ad24b81810173ad5d9abcc90c81e061eb3e0d301d73606ff3b553315d4cbb5b83716ec51ede6e04886540af183d478595305ce5b36b23fea4b85dcb5d4fe4c6f0a37a373aace006f88fdd3a5eb9ec15539a4febdcfa65e1b3f344260c8446f71b2744087ebe85a9277c40b9bcd28fc6c372288ea250d514ac3abba7a60d20f4597f658d4bf7c7caf1bfee", 0xe7}, {&(0x7f0000000540)="9c5ca0f7b7dffc0a5e37142e78ac180ca07901591d1e6be4561238e4c491bb3528972fd769241ca2f936c6bf2a129cfb98b9581dec154ff7d26cfb72095cceafea63f98b06679944ea80712a071e49e19641e4d0f8a1020174d322bc8171b828ab1265a2a168d8c5f4faa993ef6217e098e4fc65089550ca78ec8dd86e8cdae918926270503470e83e0b3dfe4283377571065982ff98b1adee1bba66d67da2bd0f4a02da813b9da0b62d8b17c858a43021c495ab4e51e7c55611c3fa38ecc4544873c06e36b0caefc4583eb22d905da49b368c0ac8d48000d8d13ebd39ba0586a09213d9a582", 0xe6}, {&(0x7f0000000340)="2264c0ae7eb3e3facb2485da564da078949deed9642c64930bee7b9e71c170d2fedc32b81473d23f6e6cd11262b5498d7a2c0d6ee18f343ac3a08ab54c1a7dcd652c0dcc5eab7cae71", 0x49}, {&(0x7f0000000040)="adf38c843fff600072a199a5ff72be797626f4850807141b9983f0ced8276d322f8c984ddf42d5ccb0f8451dc10174f54e", 0x31}], 0x4, &(0x7f0000000640)=[{0x38, 0x10d, 0x2, "638aeee7e0f812d5354e6d39fb7fe7de75550dd5e69ed3065ccb526d92144efac42832"}, {0xb0, 0x2, 0x5, "ed596b1deb5f8566fd40c047bd1c031d8b5471c24931831fc8d5ad3ae80ddfdda9b7508ab589006cce73f483450bf0b8b23d9d22f3fa7c39123e0586749a3be548e16fcb8691ee9607c1e22404829fc36021a7d188a56fc7bcfa688ffc806b8ec1709f1d4cfbb936b3112a83af68b3d81ea177ca8eba6c17cd5fe79308bcbdef5c1a2a406d71347b66d62c55ebe493340aa027f5e16cc689313a4372e4"}, {0x18, 0x110, 0x4, "a67fc18eff7ed8"}, {0x1010, 0x88, 0x3818, "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"}, {0x18, 0x110, 0x7b6d, "1fbc449e80"}], 0x1128}, 0x20008000) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x3e8, 0x7fffe, @ipv4={[0x14, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x78], [], @empty}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1, 0x0, 0x0, 0x11000000}, 0xfc) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xc8f1aa0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) [ 433.090489] netlink: 'syz-executor.0': attribute type 29 has an invalid length. 02:05:19 executing program 4: open(0x0, 0xa500, 0x5) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 433.165221] netlink: 'syz-executor.0': attribute type 29 has an invalid length. 02:05:19 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x003\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 433.224729] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 433.242653] netlink: 'syz-executor.0': attribute type 29 has an invalid length. 02:05:19 executing program 2: bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000100)={0x5, 0xfffffffffffffd6d, 0x63, 0x8, 0x13, 0x2, 0x0, 0x6, 0x42584, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x4010, 0x1, 0x7, 0x5, 0x200, 0xffffffcc, 0x81}, r2, 0x7, r0, 0x2) r3 = socket$kcm(0xa, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890c, &(0x7f0000000000)) sendmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000180)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}, 0x2}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000440)="4d7f08321ddb8cba7ed7e49e4ffa78f0044095d35b1acff2e3e1b72b356861b8e10feeff52895e36ae3293961859f8e59d54a8be2ecfa51f8f7f9d0238731a289c4fb7d00c1ba56b566f307d182377338e57cf8b34a3c50533e2af9f3ad24b81810173ad5d9abcc90c81e061eb3e0d301d73606ff3b553315d4cbb5b83716ec51ede6e04886540af183d478595305ce5b36b23fea4b85dcb5d4fe4c6f0a37a373aace006f88fdd3a5eb9ec15539a4febdcfa65e1b3f344260c8446f71b2744087ebe85a9277c40b9bcd28fc6c372288ea250d514ac3abba7a60d20f4597f658d4bf7c7caf1bfee", 0xe7}, {&(0x7f0000000540)="9c5ca0f7b7dffc0a5e37142e78ac180ca07901591d1e6be4561238e4c491bb3528972fd769241ca2f936c6bf2a129cfb98b9581dec154ff7d26cfb72095cceafea63f98b06679944ea80712a071e49e19641e4d0f8a1020174d322bc8171b828ab1265a2a168d8c5f4faa993ef6217e098e4fc65089550ca78ec8dd86e8cdae918926270503470e83e0b3dfe4283377571065982ff98b1adee1bba66d67da2bd0f4a02da813b9da0b62d8b17c858a43021c495ab4e51e7c55611c3fa38ecc4544873c06e36b0caefc4583eb22d905da49b368c0ac8d48000d8d13ebd39ba0586a09213d9a582", 0xe6}, {&(0x7f0000000340)="2264c0ae7eb3e3facb2485da564da078949deed9642c64930bee7b9e71c170d2fedc32b81473d23f6e6cd11262b5498d7a2c0d6ee18f343ac3a08ab54c1a7dcd652c0dcc5eab7cae71", 0x49}, {&(0x7f0000000040)="adf38c843fff600072a199a5ff72be797626f4850807141b9983f0ced8276d322f8c984ddf42d5ccb0f8451dc10174f54e", 0x31}], 0x4, &(0x7f0000000640)=[{0x38, 0x10d, 0x2, "638aeee7e0f812d5354e6d39fb7fe7de75550dd5e69ed3065ccb526d92144efac42832"}, {0xb0, 0x2, 0x5, "ed596b1deb5f8566fd40c047bd1c031d8b5471c24931831fc8d5ad3ae80ddfdda9b7508ab589006cce73f483450bf0b8b23d9d22f3fa7c39123e0586749a3be548e16fcb8691ee9607c1e22404829fc36021a7d188a56fc7bcfa688ffc806b8ec1709f1d4cfbb936b3112a83af68b3d81ea177ca8eba6c17cd5fe79308bcbdef5c1a2a406d71347b66d62c55ebe493340aa027f5e16cc689313a4372e4"}, {0x18, 0x110, 0x4, "a67fc18eff7ed8"}, {0x1010, 0x88, 0x3818, "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"}, {0x18, 0x110, 0x7b6d, "1fbc449e80"}], 0x1128}, 0x20008000) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x3e8, 0x7fffe, @ipv4={[0x14, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x78], [], @empty}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1, 0x0, 0x0, 0x11000000}, 0xfc) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xc8f1aa0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) [ 433.275153] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 433.307420] netlink: 'syz-executor.0': attribute type 29 has an invalid length. 02:05:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000001a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) socket$kcm(0x29, 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xf7, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 02:05:20 executing program 1: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r4, r0}}, 0x18) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r7, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:20 executing program 4: r0 = open(0x0, 0x0, 0x0) mkdir(0x0, 0x1) r1 = open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$VT_RELDISP(r1, 0x5605) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) write$char_usb(r4, &(0x7f0000000280)="3828cf50a6be79102147ba207ca6a64c16e278bfe0e80b17b722f9f3f268907d42d66162c2f4ec5f8f68cd161a680efac2304f31884314bc601354a2930ca94dc1a8c3946814b49850f0f805160132ffe53e1b39ede15bdc818b4f0732d15010e65549435f1f203908deba42aa5cec64c055cca59efbf292550b3114ac4dd2561b006c2d2081d4e29c7cd161b6653c9edad369fca274b25f596680546853145cd1f265898221bced089cd8fe368bedf95a079f2d03e28fb39f8fff14af9a0d56083d7621df3ff40992f3403200566e335dd9d331fe304a5b1b4dce2e7f9c9310e34ab676f94b9158badfb7b7a8cc45bf9786bec553356d5a", 0xf8) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000000100)) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x28, 0x3f7, 0x10, 0x70bd26, 0x25dfdbfb, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x2600c0c0}, 0x4000001) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:20 executing program 2: 02:05:20 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:20 executing program 1: open(&(0x7f00000003c0)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="fdd84095", @ANYRES16=r4, @ANYBLOB="0101000000000000000001000000440001000c00070000000000960000000c0006006c626c637200000008000b000a69700008000800000000000800090000000000080001000a000000080005"], 0x58}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2048000}, 0xc, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="cc000000", @ANYRES16=r4, @ANYBLOB="00012cbd7000fedbdf250a0000001c000280080008007f00000006000f00090000000800080004000000180003801400020068737230000000000000000000000000080005000700000028000180090006006c626c6300000000060002000100000008000b00736970000700060064680000280b018008000500040000000c0007002e000000160000000800080006000000080005000300000008000500ff0300001c00028006000b000200000006000f000200000008000500080000000800060000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x4004800}, 0x20004001) dup(r0) socketpair$unix(0x1, 0x9, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r7, 0xc0189436, &(0x7f0000000200)=ANY=[]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:20 executing program 2: 02:05:20 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) accept$netrom(r0, &(0x7f0000000100)={{0x3, @rose}, [@rose, @default, @bcast, @bcast, @bcast, @default, @remote, @null]}, &(0x7f0000000000)=0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc, 0x8000}, 0x32, 0x0, 0x0, 0x0, 0x1fc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r6 = socket$inet6(0xa, 0x2, 0x0) dup(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000480)=ANY=[@ANYRES64=r4, @ANYRES32, @ANYBLOB="9cef27c0d9cdb7f1c2d128f5645d16ae6d146a7fb791bebe8105a10e1e70c2cfbd8c0100000000000000c636a213164f95808e2dc0b3c23f5105eff308501615d044ce5bc83823778ddb6b84868900f584bf44026a9d416bfc09247475896d2273d407697afd5cb09895770cb195d5c500000000002e9bd7f0f1b6062d9731f83ee4969aae76b40f4e47c4587334b3e3a7744024e83b36f0ca75cf19b6eb140a5fc1ed67547d321afd5c2ba4308479a92715fe5ad86db0803a5a5b39b0992531aec8a70ead35124078ba20c9fe9020eb1975e2ac05664f9b61ca747879aa9460fbba5593bfdfca", @ANYRES64=r5, @ANYRESOCT]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:20 executing program 2: 02:05:20 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@loopback, 0xfffffff5}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:20 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x005\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:20 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000000), 0x4) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000001a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) socket$kcm(0x29, 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xf7, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 02:05:20 executing program 2: 02:05:20 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$FITHAW(r0, 0xc0045878) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x00', 0x0) 02:05:20 executing program 2: 02:05:20 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x006\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:20 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x46, 0x7}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:20 executing program 2: mknod(&(0x7f0000000080)='./bus\x00', 0x2000008000, 0x86128) accept$unix(0xffffffffffffff9c, &(0x7f0000000180)=ANY=[@ANYBLOB="0004001c000080000000005fe60340014502208887d380056e000004"], 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x2, 0x0) write(r0, &(0x7f0000000140)="220ece228901004cb487abb18b26a6c0df5ab8c1131f45", 0x17) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff07}], 0x100000000000005e, 0x0) 02:05:21 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000af5f00000002000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:21 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000002c0)={{0x1, 0xd000, 0xd, 0x7, 0xfd, 0x3, 0x81, 0x9, 0xff, 0x81, 0xff}, {0x2000, 0x4000, 0x0, 0x2c, 0x19, 0x5, 0x4a, 0x40, 0x51, 0x3, 0x3, 0x81}, {0x10000, 0x2000, 0xd, 0x1f, 0x81, 0x8, 0x40, 0x3, 0x28, 0x4, 0x32, 0x5c}, {0x0, 0x6000, 0x8, 0x6, 0x4, 0x80, 0x2, 0x3, 0xb6, 0x1, 0x5, 0x5}, {0xf000, 0x10000, 0x8, 0x1, 0x81, 0xff, 0x4, 0x82, 0x8, 0x6, 0x8}, {0x6000, 0xf000, 0xe, 0x81, 0x8, 0x3, 0xbc, 0x7f, 0x8, 0x81, 0x1c, 0xce}, {0x1000, 0x2, 0x9, 0x3, 0x1, 0x2, 0x7f, 0x4, 0x3, 0x1, 0x5, 0x1}, {0x1, 0x3000, 0x4, 0xbe, 0x8, 0x7f, 0x3, 0xff, 0x9, 0xc7, 0x7f, 0x3}, {0x2000, 0xfffe}, {0x3000, 0x8}, 0x40000, 0x0, 0x5000, 0x4000, 0x9, 0x2500, 0xf000, [0x7, 0x96b3, 0x401, 0x7f]}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:21 executing program 2: 02:05:21 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x007\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:21 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) mkdir(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x105) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000db95cca9cfa9549b2b2d43004afb44feab3d4620d2202de7e26d7709e471474cdcdb665dd7a39bb4bd91d4e4ba0adfd574c4422cba98f5be1efcb917bce392a42934e8633c609148eb69a47c3f5518f3458bd9103bcce70c290f81591852e0", @ANYRES32=0x0], &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000)={r4, 0x1}, &(0x7f0000000180)=0x8) ioctl$RTC_PIE_ON(r3, 0x7005) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:21 executing program 0: 02:05:21 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f00000002c0)=ANY=[@ANYBLOB="00b2c1000007a80000000000000000005f00f50a4a69808a440e01000000000000", @ANYRES32, @ANYBLOB="f2a46f5811609d6ce2e4bccba359f434839d251521081fa65e95a3050da58fac5e66ff7fd074c959c3b50b781bd38f18b32dc1323e0c5625e68ee101fe449bfc9746bf6f50533aaa9f9659620b0cb3abcee3bf5a470525e16b98b77db73eb1f72e78d151fc2b06e40300b030e74edb96f40a66fb8d60474fb239b790ad270ef5533efc800e39021fed80e6778b94c10662cf32459c2f4a44aca7346167"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:21 executing program 2: 02:05:21 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x5, 0x0, 0x1, 0x5}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000040)={0x5, r1, 0x1, 0x1}) 02:05:21 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:21 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @multicast2}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r5}) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r6, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r7}}, 0x30) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @empty, 0xe1}, r7}}, 0x30) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000280)=ANY=[@ANYRES16=r1, @ANYBLOB="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", @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:21 executing program 2: 02:05:21 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) timer_create(0x5, &(0x7f0000000180)={0x0, 0x2b, 0x2, @thr={&(0x7f0000000100)="e2abdfb47efc8d704097feba9e5c08a2178559f7aa99cd5c743dd1d71a9f9f96f0c1e4dc431139aadbda5de7658eedf110fe68cb05249ad5d7dcef79da1ec174e053386dec95b2a084d659", &(0x7f0000000280)="c70cf997c8def35f22978d58d9281a29743bfec1430fd7d88970fc5385015981c0da4aa775a75ce0c057b4c3f81bdf8c2f0cb13c5630141c5be3d4fdc0945959ee55e25ab6b59474f74eda5e6d7770d977413d73670b59066a046b36dd4143612779e680282f0e08ed87147ee0f60334e6218a99f0f66246008d5ebd4a4bf6c2b9335997fba7f6f11db2"}}, &(0x7f00000001c0)=0x0) timer_delete(r0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB="0019000000002000000000000000009ecb0000000000e77e05c6684b710000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:21 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x26) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000300)={0x1, [0x0]}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000280)={r3, 0x10, &(0x7f0000000240)=[@in={0x2, 0x4e23, @rand_addr=0x64010102}]}, &(0x7f0000000380)=0x10) r4 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$VIDIOC_QUERYBUF(r4, 0xc0585609, &(0x7f0000000400)={0x5, 0xa, 0x4, 0x80000000, 0x81, {}, {0x2, 0xc, 0x6, 0xff, 0xbe, 0xc3, "84942c3a"}, 0x3, 0x3, @planes=&(0x7f00000003c0)={0x432, 0x0, @fd=r0, 0x4}, 0x800}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r7}) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r8, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="0101000000000000000001000000440001000c00070000000000960000000c0006006c626c637200000008000b000a69700008000800000000000800090000000000080001000a000000080005"], 0x58}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x204a0000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0xc0, r9, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000001}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team_slave_1\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_macvtap\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3c}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4004000}, 0x80) 02:05:21 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x009\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:21 executing program 2: 02:05:21 executing program 0: 02:05:22 executing program 1: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x6, 0xffff, 0x20}}, 0x28) r4 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={@empty, 0x55, r7}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000040)=0x8000, 0x4) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2608, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r8, 0xc0189436, &(0x7f00000002c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="6fc200007fb0c16d7c70c53c1d0000008e3f"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:22 executing program 0: [ 435.513942] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 02:05:22 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000005f0000000000000073cee41d105fb5d28bb4ffaf5a56cac9e6aaa792e921f4a577dad6a474169e3413d836dee09eace3", @ANYRES32, @ANYBLOB]) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r7}) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f00000000c0)={@local, r7}, 0x14) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:22 executing program 2: 02:05:22 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x402) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000040)={0x2, 'veth0_to_team\x00', {0x80000000}, 0x5}) r3 = dup(r1) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="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"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:22 executing program 0: 02:05:22 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00:\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:22 executing program 2: 02:05:22 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)=ANY=[@ANYBLOB]) 02:05:22 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) flock(r0, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:22 executing program 2: 02:05:22 executing program 0: 02:05:22 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x3f}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:22 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00;\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 436.204073] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 02:05:22 executing program 0: 02:05:22 executing program 2: 02:05:23 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000c860f78d000800005fcc5a74f959fb1be7946e98004e0d7f74371da80746eeb3b36405217301e9fccf57013b23ec5d067d57637cf9818b008770250391bfa57d351b7d1d85aead905dd9af670c5bee109219f4598d8acd5a3fdfc91d77474ad428efe6877f080a0d20707c7b2cbfacfb43e3a4fb"]) 02:05:23 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="759bfe6aa81cd7ccff6127421cd65cbb3b965e3f9f56f1bc68b8260de3cc435e68fe13db1abd560f049c673f48167e509b34c0d673878ddead86213aa074e09b0fcfb9a111cf83400f837bb0ddc84311635ba7f7720fc76d0eb7214ff22d0f05396399"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:23 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000), 0x4) r4 = socket$inet6(0xa, 0x6, 0xfa) r5 = dup(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r8}) write$input_event(r5, &(0x7f00000000c0)={{}, 0x17, 0x8, 0x400}, 0x18) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000300)=ANY=[@ANYBLOB="000000040100000000000000000000005f00000000000001", @ANYRES16=r2, @ANYBLOB="45c85ec595449b6c6ab659c542c8db71f71dbe92fec01cf04a553197a960e0908b3d764fdddd8ecada219fd948b011ecfcca89b6650ed5ac9d548f0fde3642c3c0d20f9ae2f7bb534cafb95492f2cc1d7b1d3ab01e44c5e37199670885b69c5bcf307f30e00e2f981c770db8623e8e2ad9d1b47814c88307d367eaa22a258a8eddfbe0e441248601aa5c42899347145d5e7a57db7ea9cdbf65f1b3f4e781d3371dfb750f57ff2ca0e3b8d8157c246b207db393e627ae98db8ecd6f2d6fb2571eabffcdf90815505fe81ef0d34341150e379609bf365b544ea88497ce6322c533be"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:23 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00<\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:23 executing program 0: 02:05:23 executing program 2: 02:05:23 executing program 0: 02:05:23 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x3, 0x5}, 0xc) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) 02:05:23 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000000)='wlan1{security\x00', 0x80, 0x2a, &(0x7f0000000040)={0x400, 0x1, 0xf2, 0xffffffffffffffe8}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:23 executing program 2: 02:05:23 executing program 0: 02:05:23 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x3) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:23 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00=\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:23 executing program 0: 02:05:23 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) ioctl$SNDCTL_DSP_GETOPTR(0xffffffffffffffff, 0x800c5012, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x80) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) 02:05:23 executing program 2: 02:05:23 executing program 0: 02:05:23 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 437.074524] audit: type=1804 audit(5885402723.623:65): pid=27504 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir950658862/syzkaller.ZvLrwg/880/file0" dev="sda1" ino=17151 res=1 02:05:23 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0101000000000000000001000000440001000c00070000000000960000000c0006006c626c637200000008000b000a69700008000800000000000800090000000000080001000a000000080005"], 0x58}}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x6c, r3, 0x800, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x20}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40000}, 0x4800) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:23 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) write$P9_RREMOVE(r2, &(0x7f0000000000)={0x7, 0x7b, 0x1}, 0x7) 02:05:23 executing program 2: 02:05:23 executing program 0: [ 437.210518] audit: type=1804 audit(5885402723.653:66): pid=27499 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir950658862/syzkaller.ZvLrwg/880/file0" dev="sda1" ino=17151 res=1 [ 437.308900] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 437.332015] audit: type=1804 audit(5885402723.653:67): pid=27504 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir950658862/syzkaller.ZvLrwg/880/file0" dev="sda1" ino=17151 res=1 02:05:23 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00>\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:24 executing program 0: 02:05:24 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:24 executing program 2: [ 437.439766] IPVS: persistence engine module ip_vs_pe_ [ 437.439766] ip not found [ 437.473155] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 02:05:24 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) dup(r0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000000)={@ipv4={[], [], @remote}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) r7 = socket$inet6(0xa, 0xa, 0x10001) dup(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000100)=ANY=[@ANYRES16=r10]) 02:05:24 executing program 0: [ 437.541880] IPVS: persistence engine module ip_vs_pe_ [ 437.541880] ip not found 02:05:24 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:24 executing program 0: 02:05:24 executing program 2: 02:05:24 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x840, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x24, 0x1, 0x8, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6004}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x88}]}, 0x24}}, 0x4000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) umount2(&(0x7f0000000040)='./file0\x00', 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) fanotify_mark(r2, 0x8, 0x0, r4, &(0x7f0000000000)='./file0\x00') r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000c0cdda760000000114000000181f108be70f6e2cc2123404043eb49ba70a608f982db3e253587c6152cc194b2a9987d53f15de23ece333ccb57b1c3120e0d804f9d32943a177a626edde2f5656b3fd2937d0debdd9ec36e220eed564b4db7a93d81638c76beca6230b1c8ada4d6935424e0c02f8fcdcb1841909788dcdd232190b637e67334bcaedcac3f19d25f1767f7179f94096084daa9ea74f6f193e47146d9333f6c6607569c7531db357ef42952950e8204f272cf9bb21e1dabf8afc64f43f1d90998c1df55c34eb686f0e651fc1cc79e1b718b0a774b85429fe431653bf17aa948adce52c2f5b358b"]) 02:05:24 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$rfkill(0xffffffffffffffff, &(0x7f0000000000)={0x101, 0x5, 0x3, 0x0, 0x1}, 0x8) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000100)="85572e1dee7c47e52698279c65fa819f", 0x10) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r6 = dup3(0xffffffffffffffff, r5, 0x80000) ioctl$TCSETX(r6, 0x5433, &(0x7f0000000040)={0x7, 0xeaa, [0x4, 0x8, 0x5, 0x0, 0x1], 0x3ff}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r7, 0xc0189436, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="8bdc6ccc39c60bcd3cffe59c8c36eca5b7f9e99201f3527bec7db988abefb1f81b06114cfc91a3fcd9fbf35738ac0089c993ae7cbfde7d34e39ac052ee15290c688df6fb565683b3a20b97fb762c259999f512048b3aebaa6ab0b6dc9a9c5deaa67b280355e8abbc6538b37528db27bb50287bd75a1a2e85b2d46ea6b5f68f5eae9490e52452152930825e4b91f76dd6b9ab8cca9a8bf80eb5916eb242b632"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:24 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00A\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:24 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="124b8bde18000000000000bddaa47c188fc9dc469ba09689bf17851b406b723a72f1d1e076c81a04265af6d0beea"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:24 executing program 0: 02:05:24 executing program 2: [ 437.898678] audit: type=1400 audit(5885402724.443:68): avc: denied { write } for pid=27564 comm="syz-executor.5" name="net" dev="proc" ino=88570 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 02:05:24 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000000)='./file0\x00', 0x8241, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) prctl$PR_SET_TIMERSLACK(0x1d, 0x80000000) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)) [ 438.025062] audit: type=1400 audit(5885402724.443:69): avc: denied { add_name } for pid=27564 comm="syz-executor.5" name="pfkey" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 02:05:24 executing program 0: 02:05:24 executing program 1: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0xe8) mount$9p_xen(&(0x7f0000000040)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1000000, &(0x7f0000000440)={'trans=xen,', {[{@cachetag={'cachetag', 0x3d, '+.P%\')'}}, {@afid={'afid', 0x3d, 0xfffffffffffffffd}}, {@access_user='access=user'}], [{@hash='hash'}, {@dont_appraise='dont_appraise'}, {@uid_eq={'uid', 0x3d, r2}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '\xc4cpuset'}}]}}) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup(0xffffffffffffffff) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r6}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000580)={0x0, 0xfffff801, 0xa7b3, 0xffffffffffffffff, 0x0, &(0x7f0000000540)={0x990a68, 0x0, [], @p_u32=&(0x7f0000000500)=0x4}}) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r7, 0x40184152, &(0x7f0000001600)={0x0, &(0x7f00000015c0)=[&(0x7f00000005c0)="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"], 0x7ac}) r8 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r8, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:24 executing program 2: [ 438.112363] audit: type=1400 audit(5885402724.443:70): avc: denied { create } for pid=27564 comm="syz-executor.5" name="pfkey" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:kernel_t:s0 tclass=file permissive=1 02:05:24 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:24 executing program 4: r0 = open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)=0x4) dup(r1) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:24 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r1, 0x1, 0x53, &(0x7f0000000000)={0x8, 0x7, 0x0, 'syz0\x00'}, &(0x7f0000000040)=0x2c) 02:05:24 executing program 2: 02:05:24 executing program 0: 02:05:24 executing program 2: [ 438.365516] 9pnet: Could not find request transport: xen 02:05:25 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = semget$private(0x0, 0x4, 0x400) semctl$SEM_INFO(r4, 0x4, 0x13, &(0x7f00000002c0)=""/224) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000000)) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) dup(r6) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32=r6, @ANYRES64=r6]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:25 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0xa0000, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) 02:05:25 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) execveat(r3, &(0x7f0000000000)='./file1\x00', &(0x7f00000002c0)=[&(0x7f0000000100)='cgroup&.]\x00', &(0x7f0000000140)='nodev', &(0x7f0000000180)='selfeth0(.ppp1m})^\x00', &(0x7f00000001c0)='proc+@!\x00', &(0x7f0000000280)='^)\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='-keyring:%ppp1%vmnet1(GPL\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)='\\ppp1&:em1cpuset*.-$--\x00', &(0x7f00000003c0)='ppp1-\x00', &(0x7f0000000400)='ppp1eth1^\'\x00'], 0x100) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:25 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00C\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66731f66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r1, 0x4, 0x6100) write$binfmt_misc(r1, 0x0, 0x1) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="6700000004000000000000000200000000000000000000000000000000000091301e81a8f4f4efdef89ff9fb5d486e1735b1bdd1caf5e8b8698c4831d191005f5882ecb2e6ea5f8c9bc0cabedd"], 0xfde0) 02:05:25 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) perf_event_open(&(0x7f00000010c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x2e) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0xcb, &(0x7f0000000000)=0x10001, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 02:05:25 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) fallocate(0xffffffffffffffff, 0x20, 0x399a400, 0x4) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$invalidate(0x15, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) socket$nl_crypto(0x10, 0x3, 0x15) 02:05:25 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f0000000380)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x82200, 0x0) ioctl$KVM_S390_UCAS_MAP(r5, 0x4018ae50, &(0x7f0000000340)={0x3, 0x8001, 0x3}) getpeername$unix(r0, &(0x7f00000003c0), &(0x7f0000000440)=0x6e) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f00000002c0)={{0x3, 0x6}, 0x1, 0xfffffffa, 0x5, {0xff, 0x7f}, 0x2, 0x7}) r6 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="fcd060776465de0babe5c1657a6ef8e69007ec14beec0f31b2b70ed0f5d6e12f0418f404658eea7448da2d3b49685aeadf90c3be6b2a3ddcddbe8c157f4c0f3c89e4496c3f49d83a1abf32bad87e0bd00a2c018b1f260593b0"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66731f66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) fcntl$setstatus(r1, 0x4, 0x6100) write$binfmt_misc(r1, 0x0, 0x1) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="6700000004000000000000000200000000000000000000000000000000000091301e81a8f4f4efdef89ff9fb5d486e1735b1bdd1caf5e8b8698c4831d191005f5882ecb2e6ea5f8c9bc0cabedd"], 0xfde0) 02:05:25 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00D\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:25 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="57f46a14cd1ada415ab7d1b00f41ccfdebe7d07270d0f473000000009b8ae6a5e0304a14000080000000000000000000"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:25 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r4}) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r6, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r9}) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000180)='dctcp-reno\x00', 0xb) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000100)={0x2, 0xfbee}) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000040)) r10 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r10, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) 02:05:25 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) dup(r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:25 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x6a}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x68, r4, 0x100, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x1, @media='udp\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40041}, 0x4004) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000000)='vmnet0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) open(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80500, 0x40) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:25 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00E\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:25 executing program 1: open(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x20002, 0x100) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r5}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040)={0x9, 0x8, 0x8, 0x3, 0x6}, 0x14) r6 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYRES32=r7]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:26 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'ip6gretap0\x00'}) 02:05:26 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) perf_event_open(&(0x7f00000010c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x2e) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0xcb, &(0x7f0000000000)=0x10001, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 02:05:26 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) prctl$PR_MCE_KILL_GET(0x22) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@md5={0x1, "28e7f73030ff5cb3da72a4e93c5c1440"}, 0x11, 0x5) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:26 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00F\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:26 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:26 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/bsg\x00', 0x400200, 0x0) write$9p(r0, &(0x7f0000000180)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$ax25_int(r3, 0x101, 0x4, &(0x7f0000000240)=0x1ff, 0x4) write(0xffffffffffffffff, &(0x7f00000000c0)="67ce1e33113ef5798a13f524cf0696dc0da2f18337ba51ddb4644f1a6ff96eff5b658be281ea259c295ace0bd8bc1ff5b0b282de1e", 0x35) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000001340)={&(0x7f0000001280), 0xc, &(0x7f0000001300)={&(0x7f00000012c0)={0x40, 0x4, 0x8, 0x208, 0x0, 0x0, {0xc, 0x0, 0x6}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x9300}, @CTA_TIMEOUT_DATA={0x24, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_FIN_WAIT={0x8, 0x4, 0x1, 0x0, 0xffffe05c}, @CTA_TIMEOUT_TCP_UNACK={0x8, 0xb, 0x1, 0x0, 0x8001}, @CTA_TIMEOUT_TCP_SYN_SENT2={0x8, 0x9, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_TCP_CLOSE={0x8, 0x8, 0x1, 0x0, 0x4}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000001380)=0x343a8c69, 0x4) write$midi(r7, &(0x7f0000000280)="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", 0x1000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) 02:05:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66731f66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) close(0xffffffffffffffff) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x40800) fcntl$setstatus(r1, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="6700000004000000000000000200000000000000000000000000000000000091301e81a8f4f4efdef89ff9fb5d486e1735b1bdd1caf5e8b8698c4831d191005f5882ecb2e6ea5f8c9bc0cabeddcd13b58590b984"], 0xfde0) [ 440.186657] audit: type=1804 audit(5885402726.733:71): pid=27743 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir612117874/syzkaller.lyP4uY/460/file0/bus" dev="loop0" ino=10 res=1 02:05:26 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)=ANY=[@ANYBLOB="00000007000000000000000000000315aa53ec000000000013eb44c60b8d3630c6ce8a4862105b5929f7d36b400f66cf166e0e55a943939b5ca68a7dc7aabe9d90fd72047644af6d6c8af0d9b614d09b5f5e953f2320562c0f276474b0fd0f1045c42e3601677432a60e55469451afbd2f4e1c92dbc82e14a18490c8e4a9d775eab1e2aa90ad0e563fd079475bf78f84607ae3ddb92ebb876c", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:26 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) accept4$nfc_llcp(r1, 0x0, &(0x7f0000000000), 0x80800) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r7}) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000040)=ANY=[]) 02:05:26 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) memfd_create(&(0x7f0000000100)='\'system\x00', 0x4) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="ee9cb076a6dd313eb5a094c449a8e88a9245bd72c8004273844c0e617fd0c50b6493f1177d6e135d0916bf8bf678b9141393d58226f54f298c183466e3bcbc2c1ee8fde233091718ca546ab162dc90f101ea51f38da8707eb2375a39b9eaff2e47abebf043fb8f96d844d60c3fe1093d591471feff7691c320839993897c32e8781429932ff6cce7550100000031996a67b7091a1eb2ce2a5001"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r6, 0xc0305710, &(0x7f0000000000)={0x1, 0x7, 0x100000001}) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:27 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:27 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) fsetxattr$security_selinux(r2, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:etc_mail_t:s0\x00', 0x20, 0x1) r3 = dup(r1) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000480)=ANY=[@ANYBLOB="0000005f00000000d2274b0000008caedc677c2a7d98fb1609fa81166b3fcfd087a8c063659e8afc8e4570e2c8860dc4990f522c0df5c1684f8e4f760444c67b7659fc443f412d7352c30768e111b6a412e6bcf9f818546ad23bf824490b30656f142deb1565968dd90732bb88ab5355426af89cf1dbd2e35fbcd2d949b7fc36a3aabd86d0a8fc6f5567c0f210053ba762425a71121be6f9fc7bac45c117813f4b897b9601989a14eba92cb27231999ba38d59842a0f5fe4e274ee649e25199c6c0904a25daea548d39f51d08986472ffd0c27e4249f1e18a381e065aae8865f7d11", @ANYRES32, @ANYBLOB="5b576d0f68380c309ad9c28028157bcfa52f5c3800ffc211f79c8421b8fc6b93fa700d878e1a4d136eb5a7938fc6a2e068f3fdf5132ca8eafa30b1eb6938c2f78bf88f0213a510aff61a61f8e1138805f0521f4422d1c15fee570623f026a91e25321b8e"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 440.672265] audit: type=1804 audit(5885402727.213:72): pid=27782 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir612117874/syzkaller.lyP4uY/460/file0/bus" dev="loop0" ino=10 res=1 02:05:27 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000000)={0x7, 0x7f, 0x1}, 0x7) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x8100, 0x0) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000140)=0x1, 0x4) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r5}) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000f80)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001080)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@private1, @in=@private=0xa010101, 0x4e23, 0x7ff, 0x4e21, 0x0, 0xa, 0x20, 0x20, 0x4, r5, r6}, {0x9, 0xee4, 0x200, 0x6, 0x80000000, 0x7f, 0x0, 0x9}, {0x1, 0x7ff, 0x3, 0x1}, 0x510a, 0x6e6bb8, 0x1, 0x1, 0x3, 0x2}, {{@in=@remote, 0x4d3, 0x3c}, 0xa, @in6=@private0={0xfc, 0x0, [], 0x1}, 0x3507, 0x2, 0x0, 0x4, 0x4, 0x7387ac0c, 0xfffffffd}}, 0xe8) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="62ffaa7e881483db3cc07f8a161a91c4069e3c6f72df150d85f11b100255ff4f89f41879f043a230267c42e1114a425ab5fa3f5fa05aaac92516e167e78c0af789e4c159222c3ed65d984fcf45f502fb63dae0c0abb28df409e83d0c10615374c77e0181"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 440.830097] audit: type=1400 audit(5885402727.373:73): avc: denied { relabelto } for pid=27787 comm="syz-executor.1" name="UDPv6" dev="sockfs" ino=88890 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:etc_mail_t:s0 tclass=udp_socket permissive=1 02:05:27 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='nat\x00') 02:05:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x38, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x2, r2}]}}}]}, 0x38}}, 0x0) 02:05:27 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:27 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f005047281cc597", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x100) 02:05:27 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r7}) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000000)={0x40, 0x6}) r8 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r8, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:27 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r4}) write$9p(r1, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) 02:05:27 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='\x00', 0x8040, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r5}) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f0000000100)=0x4) ioctl$KVM_S390_INTERRUPT_CPU(r2, 0x4010ae94, &(0x7f0000000040)={0x80000000, 0x5, 0x79}) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$DRM_IOCTL_INFO_BUFS(r7, 0xc0106418, &(0x7f0000000000)={0x80000003, 0x9, 0x10020, 0x8, 0xf, 0x5}) 02:05:27 executing program 0: sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000000900), 0xc, 0x0}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/config\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 02:05:27 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000000)=0x17f) 02:05:27 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4000, 0x120) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r6}) bind$isdn_base(r3, &(0x7f0000000180)={0x22, 0xb8, 0x55, 0x4, 0x1f}, 0x6) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="80dd172f11c35e0100000000921377d0b12e546084138ef8f882c20d64c809e3479f4551640b540aee2d3a18258760ef538c37cc508875ec2ba4c48b7db597ff0a76bdd5b3f523ac75f976faff2ea85a5f01e01bc3dbf5bd2ad1e14d00"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:27 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) write$P9_RLOCK(r4, &(0x7f0000000000)={0x8, 0x35, 0x1, 0x2}, 0x8) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:28 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00I\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:28 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000fffffffffffffff50000005fef30d9e9c6f4a4e24c4f819e55e97d6800000000000000001bbd08c42439468dd48036752d04b2ca13cfdefbb4539fbe54cac876975bfe9404d68ede2e08ba252ed5df4ab53c87ecdd530bfcc8a2353980c4730c"]) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_RESUME(r0, 0x4147, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r5}) bind(r2, &(0x7f0000000100)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'tgr160-generic\x00'}, 0x80) 02:05:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xffba) 02:05:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x4cb]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000380)={"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"}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:05:28 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x3c3302, 0x8) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="cdfacb84d6ef49048e4d1c5a745fadd1d3e6ae294abb565984f19e8519067054a0f89c69c6c043a437d2c4d0d277b61aadb24b5de7ea1562ca5a338fdfc342171da8f3d82c0af97cba896ba7331c2a9d1ea0c1a6d146"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) socket$xdp(0x2c, 0x3, 0x0) 02:05:28 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYRESDEC]) 02:05:28 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000000)=0xe6) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:28 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00J\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:28 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:28 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66731f66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$AUDIT_GET(0xffffffffffffffff, 0x0, 0x48001) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x8200) symlinkat(0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x14507e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000500)=ANY=[], 0xfde0) 02:05:28 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x50480, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0, 0x8}, 0x461, 0x9a3, 0x0, 0x0, 0x55, 0x20, 0x401}, 0x0, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r8}) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x4, 0x96, 0x9, 0x78, 0x0, 0x40, 0xb20, 0x7, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x2020, 0x8000, 0x81, 0x6, 0x3, 0x4, 0x9}, 0x0, 0x7, r5, 0xf) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="0003000000d4810000000000000000005f00000028000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xffba) 02:05:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000000)) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4e9696eced590700", 0x57) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-aesni-avx2\x00'}, 0x58) r2 = open(&(0x7f0000000080)='./file0\x00', 0x4000, 0x0) socket$inet6(0xa, 0x2, 0x801) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) r6 = socket$inet6(0xa, 0x2, 0x0) dup(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) setsockopt$inet_MCAST_LEAVE_GROUP(r5, 0x0, 0x2d, &(0x7f0000000180)={0x3d79, {{0x2, 0x4e24, @empty}}}, 0x88) r7 = dup(r3) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000100)=ANY=[]) 02:05:28 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mount$overlay(0x0, &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000000)='overlay\x00', 0x100000, &(0x7f0000000300)={[{@index_on='index=on'}], [{@euid_lt={'euid<'}}, {@euid_gt={'euid>', r2}}, {@fsmagic={'fsmagic'}}, {@appraise='appraise'}, {@subj_type={'subj_type'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x101c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000100)=ANY=[@ANYBLOB="000000faffffff0000000000", @ANYRES32, @ANYBLOB="0159e838347decedac58af9f3bb405607609c61f1ab852c254bb0ad57cd87e2bbe031114a79b83c8b758525b6edb9d538286aa67b174deb69c8315a724fe454c470760379a44a10db7d176cb8932d3518cb067702adf34645ec2092cb39ddbea2d3c521e54a2261f6d95f6fe0857c44fc3b77f08d56aa14d34e7b579fffd1146ceed79c234ca5bba1716ebb9198eb46b7031807a8042412d73665339de2e662b830f19a092eda677e16f880000000000000100719d41a27f746673b4be0912a76a2090b90c7e68a0864461b573e33c820b"]) openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2080, 0x10) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 442.270784] audit: type=1800 audit(5885402728.813:74): pid=27920 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=17182 res=0 02:05:28 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r7}) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f0000000380)="7e77befd4a97249fa9122d8eb5ec4e2d647450c35256e0196e331050679d2c0a3a0270ed54cd768449458087d73a13be8e9e1f553ee7c4f0c592b7fd9b7954fe5fddc9e8000984eb3a5a0f54df27227dab4fb73720249c71ac43d13fa423e74cf4188c0202eaab44b17b1d7efaec5fb51ad07443a89334ba56a745cd009daec49d91ad4f4d6c7dae7ce3eece4c9efdb4d5e56abf") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r8, 0xc0189436, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="7ddf544b394b77e7b34c92e02907915b428905f77562b7b02f11233f74df73501f42f6b6bfd2e2186076213ecb8698cbec3fa2a173ea57a688182d349624de4a74203a68041daf1d222e7d3e5c9fc6ab035d18e29581431dcd741e214979f15838412e9b964774e0843a85771cc198c4e32f33d8ff82809391bbd64b49e72573965603251ea435d03841f996628d8cae3d66487c14f0258ffb"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:28 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00K\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:28 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66731f66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) creat(0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x40800) fcntl$setstatus(r1, 0x4, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x14507e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000500)=ANY=[@ANYBLOB], 0xfde0) [ 442.335753] audit: type=1800 audit(5885402728.863:75): pid=27927 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=17182 res=0 02:05:28 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r5}) write$9p(r1, &(0x7f0000000000)="4c9607080000449300000000000300000059f613", 0xfe91) r6 = inotify_init() ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r6, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]) r7 = open(&(0x7f0000000080)='./file0\x00', 0x18040, 0xef) ioctl$FIDEDUPERANGE(r7, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="00eb4d00f7"]) 02:05:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, 0x0) 02:05:29 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB="000046000000ed02000000ffffd4ad051e9f6c8171173777d666d5bc3b3315e3b1196580e600a90370a800"]) 02:05:29 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0xf9, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101, 0x6dde}, 0x0, 0x0, 0x80000000}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r7}) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x0, 0x70e, 0x70bd27, 0x25dfdbff, {}, [@GTPA_NET_NS_FD={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @rand_addr=0x64010100}, @GTPA_LINK={0x8, 0x1, r7}, @GTPA_FLOW={0x6, 0x6, 0x1}, @GTPA_PEER_ADDRESS={0x8, 0x4, @local}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8040}, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 442.630600] audit: type=1800 audit(5885402729.173:76): pid=27952 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="loop0" ino=11 res=0 02:05:29 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r4}) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000100)) r5 = socket$inet6(0xa, 0x2, 0x0) dup(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000002c0), 0x3}, 0x0, 0x3, 0x0, 0x0, 0x5}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) r8 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r8, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="19905d0c08a69b805de9000f301ff4d0799e89782024975a4d59b86dfd06082be7a31d9bce65a8579d083702ab2e602c676a50c29f25364a7042aa2ec445538f42cd9c2cbcf424682eec76ad48874bef89df"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:29 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:29 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f00000000c0)="0f01b4070066b9a50b000066b80600000066ba000000000f3065f3af0f090f01c8362e0f71d7072626f30fc772b366b9800000c00f326635010000000f30c40266b9590900000f32", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 442.769771] audit: type=1800 audit(5885402729.313:77): pid=27952 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="loop0" ino=11 res=0 02:05:29 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000100)='./file0/../file0\x00', 0x8040, 0x51) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r5}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000000), 0x8) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) 02:05:29 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="1423dcd8382cecffaf11f03e24340a43a9edcf4879bdd8068b9b5b5fcb8baf28db5503"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:29 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:29 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c000100766574"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32, @ANYBLOB="00000400f1ffffff0000000008000100687462001c00020018000200030000000001000000001e000800000000000000ce204b70759690626033cefc9f29f0a316c47d6335ffa3a711759f0cc96a64a78d1424d7fbb9ce04556e206ac506b1011a61efc33a09ebbb2af603af78d8b1c564eebfed008c914bfbadcd782389f49d356138458f10139554386cdc1a5949ec127445ab7ec5cb7e"], 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x0) 02:05:29 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00M\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:29 executing program 5: r0 = socket$inet6(0xa, 0xa, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r4}) getsockname$ax25(r1, &(0x7f0000000000)={{0x3, @default}, [@bcast, @default, @default, @netrom, @default, @rose, @default, @rose]}, &(0x7f00000000c0)=0x48) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00_']) 02:05:29 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) io_setup(0x3, &(0x7f00000001c0)=0x0) io_submit(r3, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0, 0xff31}]) r4 = socket$inet6(0xa, 0x2, 0x0) dup(r4) r5 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x6, 0x14001) io_cancel(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0xce, r4, &(0x7f0000000000)="56fa0cb979445a1e8bfbb0b5e6e2fe457b0691041ed15c7709", 0x19, 0x5, 0x0, 0x0, r5}, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="22a03af5ab6c3d59ac1381d9ed721660dd74f6111b99b7a7f99263314739c43b"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:29 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000005f0000000000000039466a54f682348270e3644df0a023a66e262cf797852e6ee4e04d9ec94ecd410e0b53fa17729e9e8afdcb88137a131acb6d7b0a99fd8fc1f0fa12e77ac05c281dfc6bbe8804edee13e9da6f35991eca9d3da276bf3657717b1a866d920d5def6c16", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 443.025916] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 443.076176] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 02:05:29 executing program 0: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPAN_DISPLAY(r0, 0x4606, &(0x7f0000000040)) 02:05:29 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)=ANY=[@ANYRESHEX=r0]) ioctl$USBDEVFS_GET_CAPABILITIES(r0, 0x8004551a, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(r6, 0x401070ca, &(0x7f0000000200)={0x200000000000, 0x9, 0x1}) readv(r2, &(0x7f0000000240)=[{&(0x7f0000000300)=""/186, 0xba}, {&(0x7f00000003c0)=""/139, 0x8b}, {&(0x7f0000000480)=""/148, 0x94}], 0x3) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r5}) write$P9_RRENAME(r2, &(0x7f0000000180)={0x7, 0x15, 0x1}, 0x7) r7 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x10001, 0x107081) ioctl$NS_GET_PARENT(r7, 0xb702, 0x0) fsetxattr$security_capability(r2, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x1, 0x1b}]}, 0xc, 0x2) 02:05:29 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00N\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:29 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file1\x00', 0x208180, 0x100) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="611491831045647a605c63a1eab54f280e21aa4f42e24df8f1f6261693c2384f7919bb0c22f7bfe1415edbbcbaa00a006d0f41d450efa4298c3f7e9aaca98af1870b941cf059721f93a3be5ca485a4855b96dfb362673b7e25bdc63007e7df"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x6, 0x4, 0x7fff, 0x6e, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100]}, 0x40) 02:05:29 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00O\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@newtaction={0x2c, 0x30, 0xffff, 0x0, 0x0, {}, [{0x18, 0x1, [@m_ife={0x14, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x4}, {0x4}}}]}]}, 0x2c}}, 0x0) 02:05:29 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0xd, "20f6cc9d7a6367f96f48677684"}, &(0x7f0000000180)=0x31) r3 = dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r6}) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, &(0x7f0000000000)=0x212000, 0x4) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r7, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000480)={@broadcast, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "e16a13", 0x8, 0x3a, 0x0, @dev, @mcast2, {[], @echo_reply}}}}}, 0x0) 02:05:30 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:30 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2b1}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x41c1c1, 0x135) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:30 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x143001, 0x0) write$uinput_user_dev(r0, &(0x7f0000000040)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc60d902, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff]}, 0x45c) 02:05:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f00000000c0)="0f01b4070066b9a50b000066b80600000066ba000000000f3065f3af0f090f01c8362e0f71d7072626f30fc772b366b9800000c00f326635010000000f30c40266b9590900000f32", 0x48}], 0x1, 0x1a, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) migrate_pages(0x0, 0x2, 0x0, &(0x7f0000000240)) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) 02:05:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000080)="eb3c785cdb2d415747f774000204010002000270f7f8", 0x16}, {&(0x7f00000007c0)="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", 0x1d3, 0x2e}], 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x82307202, &(0x7f00000001c0)) 02:05:30 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000680)={&(0x7f0000000340)={0x320, r1, 0x200, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x30, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}]}, @TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff66c8}]}, @TIPC_NLA_NODE={0x24, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x108, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff4f0}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa67}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_LINK={0x174, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x993}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa24}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xac}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x38000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x956}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x29}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9608}]}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x44b}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x40}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x39000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x320}, 0x1, 0x0, 0x0, 0x40000}, 0x48004) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r2) r3 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='trusted%\x92vmnet0(:vmnet0em0posix_acl_access${^\xc0vboxnet0}[}bdev[selinux\x00', r2) r4 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r4) keyctl$search(0xa, r3, &(0x7f00000001c0)='user\x00', &(0x7f0000000280)={'syz', 0x1}, r4) open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:30 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000340)=ANY=[@ANYBLOB="000000000000000000000000000000000600000000000000", @ANYRES32, @ANYBLOB="dff5ba24458f132a4021a506cc0fe28cb628931c2820589c4449a78892773c32668b74981d0415c0ff6a3f17b5c7a62f5c78a3ceae89c56b6014358d308700051bc5973460ccfd10293edf6fa308e26ffb7d2b15e3db566e702976d5fa5054d29e9c0e95af69bb399b5043fcd983f2175b3b9fa27e7e1f7ebf6cb729d80fa016564bf8e892acf1fafc9142f3a6dc390043e3b2d06e176526f0331feb44c833fa7e97f24141be328ed7acb51334c62b65"]) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000440)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r6}) perf_event_open$cgroup(&(0x7f00000002c0)={0x1, 0x70, 0xc, 0x4, 0xc1, 0x75, 0x0, 0x40, 0xe2727, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x2000, 0x7, 0x68a9, 0x3, 0x8, 0x6, 0x1ff}, 0xffffffffffffffff, 0x7, r5, 0x6) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:30 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00Q\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:30 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x156) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB="00e3fffe00000000000000000000005f"]) r1 = getgid() getresgid(&(0x7f0000000340), &(0x7f00000003c0)=0x0, &(0x7f0000000500)) r3 = getegid() getgroups(0x2, &(0x7f0000000540)=[r2, r3]) setgroups(0x2, &(0x7f0000000040)=[r1, r2]) getresgid(&(0x7f0000000340), &(0x7f00000003c0)=0x0, &(0x7f0000000500)) r5 = getegid() getgroups(0x2, &(0x7f0000000540)=[r4, r5]) setgroups(0x2, &(0x7f00000000c0)=[r1, r5]) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000300)={0x1, [0x0]}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000040)={r7}, &(0x7f0000000140)=0x8) [ 444.113310] FAT-fs (loop2): Directory bread(block 1) failed [ 444.119078] FAT-fs (loop2): Directory bread(block 2) failed [ 444.130448] FAT-fs (loop2): Directory bread(block 3) failed [ 444.138067] FAT-fs (loop2): Directory bread(block 4) failed 02:05:30 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r5}) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000000000)) open(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x40000, 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000000000916dc7dbc9676c8476cc656dfab8816df2aae32e2f108d978c860d5f444cf837bdf12d5a1ea76c9e71ecda9fd7d4db696f419bff5b7f8b8bd8d76d26799d652f44ff99a841df8d87f27563c2741001294ae2a2ab07029f6e33e7613b9383e4ffc0b9aeb3f41dbb291a9f46e43c22874e937855c0d4e3943ebc89d06319794a5167e5340b6650eb93247538fb674c0e93f87e13ba4adc67b0", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 444.189258] FAT-fs (loop2): Directory bread(block 5) failed [ 444.221502] FAT-fs (loop2): Directory bread(block 6) failed 02:05:30 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00R\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:30 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xfffffffffffffffd, 0x20042) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x28}) r2 = socket$inet6(0xa, 0x3, 0x9) r3 = dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x7f}, 0x0, 0x9a7}, 0xffffffffffffffff, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xd9, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYRES32=r0, @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000004c0)=ANY=[@ANYRES64, @ANYRES16=r7, @ANYBLOB="86a698f664c76375e5bec13d023ab280077f1c479e56a51850ab3fcea88fb375942f9146741eed7674412d8bc0fb728ea1d654e75b4d39587da141f5b10b011a8ca164a010070ce2863f33aa188f2097298257fbfea33c05172b9e0771affdb8a040caaf511f52b6b5e91d09898ae0930cf813c4693c246d098c2e6b92f094229b54e959f2a62b8ec75c32da051af86e76f500ef7096f5d11500000000000000024a"], 0x3}, 0x1, 0x0, 0x0, 0x4008015}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="ba00000069db77ecb41c6d7845171966eb1c75560ec2dc00", @ANYRES16=r7, @ANYBLOB="000029bdc4b4e6a6df250c0000000800370000000100"], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x48000) pipe(&(0x7f00000002c0)) [ 444.266776] FAT-fs (loop2): Directory bread(block 7) failed [ 444.287241] FAT-fs (loop2): Directory bread(block 8) failed [ 444.335600] FAT-fs (loop2): Directory bread(block 9) failed [ 444.358071] FAT-fs (loop2): Directory bread(block 10) failed 02:05:30 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000140)=@ccm_128={{0x304}, "408f16f110daa35e", "47e1a6b913eb283de815ba5f84730fa8", "3162798b", "623d4b5cc47dce83"}, 0x28) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) signalfd4(r2, &(0x7f0000000000)={[0xfffffffffffffff9]}, 0x8, 0x80000) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) socket$inet(0x2, 0x6, 0x80000001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="0000eaffff5e00"/24, @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) pipe(&(0x7f0000000100)) 02:05:30 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000000280)=""/97, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000780)={0x1, 0x0, 0x0, &(0x7f0000000100)=""/143, 0x0}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000003c0)=0x1) 02:05:31 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r7}) ioctl$BLKDISCARD(r4, 0x1277, &(0x7f0000000000)=0xb560) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r8, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66731f66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) close(0xffffffffffffffff) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x40800) fcntl$setstatus(r1, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x14507e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="6700000004000000000000000200000000000000000000000000000000000091301e81a8f4f4efdef89ff9fb5d486e1735b1bd"], 0xfde0) 02:05:31 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00S\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:31 executing program 4: r0 = open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r3 = dup(r0) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r4}) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000100)={0x3ff, [0x2, 0x100, 0x2, 0x6, 0xfff, 0x6, 0x5, 0x1, 0x1, 0x200, 0x1ff, 0x100, 0x1, 0xffff, 0x9, 0xfa, 0x5, 0xca, 0x80e, 0x7, 0x401, 0x3, 0xfff, 0x7, 0xa1, 0xc6, 0xaa, 0x2, 0x800, 0x1, 0x8, 0x9, 0x20, 0x3, 0x7, 0x1, 0x6, 0x98f, 0x2, 0xffff, 0xfff8, 0x280, 0x200, 0x80, 0x93, 0x88, 0xfffb, 0x80], 0x6}) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB='Y']) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:31 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:31 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x143001, 0x0) write$uinput_user_dev(r0, &(0x7f0000000040)={'syz0\x00', {0x8, 0x8, 0x1, 0x5}, 0x3f, [0x8, 0xeaf7, 0x1, 0x7f, 0x0, 0x6, 0x0, 0xffff, 0x0, 0x7, 0x0, 0x0, 0x9, 0x3, 0x0, 0x9, 0x40, 0x4, 0x7, 0x0, 0x1, 0x8, 0x7, 0x1, 0xc6, 0xfffffe00, 0x0, 0x286c, 0x0, 0x7, 0x0, 0x10000, 0x6, 0x0, 0xfffffffb, 0x0, 0x9, 0x0, 0x1f, 0x0, 0x81, 0x3, 0x81, 0x0, 0x8, 0x1000, 0x0, 0x3, 0x0, 0x3, 0x2, 0x7, 0x2, 0x0, 0x4, 0x9, 0x2, 0x4, 0x3ff, 0x9, 0xffff, 0x800, 0x0, 0x4], [0x3, 0x5, 0x4, 0x6, 0x4, 0x3ff, 0x800, 0xffffffff, 0x2, 0x4, 0x5, 0x185, 0x1ae4, 0x1ffc0000, 0x3bb539ec, 0x7ff, 0x2000000, 0xb189, 0x6e, 0x0, 0x1000, 0x81, 0x4, 0x2000000, 0x7, 0x7f, 0x6, 0xc60d902, 0x0, 0x0, 0x7d7, 0x0, 0x0, 0x9, 0x768, 0x8, 0x0, 0x40, 0x2, 0x8, 0x2, 0x3ff, 0x0, 0x0, 0x10000, 0xc48, 0xfffffffc, 0x7, 0x2, 0x8, 0x4, 0x80, 0x0, 0x2, 0x0, 0x8001, 0x0, 0x0, 0x5, 0x42ac, 0xffffffff, 0x8, 0x81, 0x7], [0x2, 0x6f, 0x4, 0x101, 0x6d84f46c, 0x6, 0xff, 0x1, 0x1, 0xc884, 0x45f, 0x2e, 0x7fff, 0x9, 0x1, 0x6, 0x9, 0x1000, 0x0, 0x8001, 0x20, 0xa3ac, 0x2, 0x9, 0x81, 0x3, 0x44b6d54c, 0x1, 0x31c, 0x9, 0x646, 0x5, 0x7f, 0x9, 0x7fff, 0x2, 0x3a9, 0x3, 0x2, 0x4, 0x156, 0x1, 0x9, 0xd2, 0x756, 0x1a, 0xffffffc1, 0x4, 0xffff, 0x7, 0x1, 0x80000000, 0x9, 0x5, 0x13, 0x81, 0x36, 0x5, 0x5, 0xa185, 0x169, 0x0, 0x1c0, 0x1ff], [0xfffffffa, 0x8, 0x0, 0xffff, 0x4, 0x3f, 0x86e, 0x6, 0x1, 0xc86, 0xcd, 0x80, 0x1, 0x5, 0x5, 0x5, 0x7, 0xff, 0x0, 0x2, 0x8, 0x7f, 0x2, 0x0, 0x6, 0x7fff, 0xd0, 0x81, 0x9, 0x9, 0xa3c, 0x5, 0xea, 0x7fffffff, 0xfffffffe, 0xffffba64, 0x4bd4, 0x9, 0x0, 0x7, 0x0, 0x6, 0x8, 0x80000001, 0xbb1e, 0x5, 0x80000001, 0x7, 0x3, 0x1000, 0xbafe, 0x6, 0x9, 0xe1000000, 0x5, 0x6, 0x4, 0x7, 0x4, 0x8, 0x3ff, 0xfffffc00, 0x400, 0x9]}, 0x45c) openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x800, 0x0) [ 444.852327] audit: type=1800 audit(5885402731.393:78): pid=28180 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="loop0" ino=12 res=0 [ 445.015813] audit: type=1800 audit(5885402731.553:79): pid=28197 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="loop0" ino=12 res=0 02:05:31 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) 02:05:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66731f66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000500)=ANY=[], 0xfde0) 02:05:31 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa040000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r2, 0x8, 0x70bd2a, 0x25dfdbfc, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x3400c015}, 0x4843) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:31 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00T\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:31 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000000)) r3 = dup(r2) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000040)=0x5, &(0x7f0000000100)=0x4) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="cd9fe0de014a678bb0d2649a658d6321d80cd22834ea7a71abd95940c4a02126ee75920000000000000004ff353d77df9d45dc967a25ac40a27be4bfc20465a6a3dcc93f4739a7ba65bcffaa48ccf384fa63ba8d209de545ec092184bc0a1c07a934"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:31 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = open(&(0x7f0000001640)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x80086601, 0x0) 02:05:31 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) socket$nl_crypto(0x10, 0x3, 0x15) chdir(&(0x7f00000002c0)='./bus\x00') r0 = open(&(0x7f0000001640)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x80086601, 0x0) 02:05:31 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0xc0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="94eb61e2dee15474342fe4f1e1768e41d1f1e4bd11570c8b19367e6e62fdaf2dfc74945cb40d9c4718ef43e950a7f576a93cc26e5da74a0bc4eacbfdc44c0000800001d947db44f25e0fe611f322f6faaef4b14dc680b704edc9c21d5a3c4c04b92204000000c33cec42fde6ae020000000008000000000000c2ba0094d49316b5588c15f081617897eaf93fb8c2090182162c0fa607cd4462db36d6f4478d483d3fc5bab47c7dbb707b4ef7c0825fb4ab86b7d1cadee5c300"/199]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:31 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00U\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:31 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x25a9, 0x193e}}, 0x0, 0xffffffffffffffff, r1, 0x8) r2 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB="0000012039e67dd3ca7c885566f800000000cc0000000000001000519d22fa5f00006200000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:31 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) socket$can_bcm(0x1d, 0x2, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r5}) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r6, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r6, 0x0) r7 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, r7, 0x100, 0x70bd2d, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x22}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20008000}, 0x20000801) sendmsg$NLBL_MGMT_C_LISTALL(r6, &(0x7f0000000500)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000140)={0x14, r7, 0x400, 0x70bd2a, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x20000080}, 0x4048000) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r7, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c885}, 0x44810) 02:05:32 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="39f17ec605df17f7ca36c23f7ccc638c081e59b971b6d0209f6aa9e576"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:32 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r6}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000280)={{0x1, 0x0, 0x6ed2f075, 0x2, 'syz0\x00', 0x5a1}, 0x0, [0x4, 0x40, 0x7, 0x20, 0x0, 0x8, 0x3, 0x0, 0x1, 0x10000, 0x3bd, 0x3f, 0x4, 0x1, 0x7fffffff, 0x7, 0x5, 0x1, 0x20, 0x401, 0x8, 0x8, 0x4, 0x8, 0x6, 0x1ff, 0x0, 0x5, 0x0, 0x3, 0x80, 0x3ff, 0x7, 0x8, 0xb3e4, 0x8, 0x9, 0x0, 0x1f, 0x6, 0x8, 0x7, 0x0, 0x7, 0x570a, 0x75a, 0x2, 0x33, 0xf33, 0xf71e, 0x9d1, 0x9, 0x6, 0x5, 0x8, 0xffffffff, 0x4, 0xf791, 0x7745, 0x7fffffff, 0x1, 0x1, 0x9, 0xfffffffffffffffb, 0x1, 0xb0f5, 0x8, 0x7, 0x3a, 0x80, 0x6, 0x6e7, 0x94a3, 0x5, 0x6, 0x7dd, 0x4, 0x5, 0x1, 0x6, 0x7ff, 0x400, 0x3, 0x2, 0x54, 0x1c2aa095, 0x800, 0x6, 0x100, 0x5, 0xffff, 0x5, 0x0, 0x9, 0x9, 0x4, 0x7, 0x7f, 0x1000, 0xfffffffffffffffa, 0x2, 0x9, 0x2, 0x1000, 0xffffffffffffffff, 0x100000000000, 0xef32, 0x7f, 0x880, 0x5, 0x10001, 0x8000, 0x9, 0x2, 0xa3, 0x1, 0x1, 0x0, 0x2, 0x4, 0x1, 0x7, 0x9, 0x100, 0x7, 0x5, 0x1f, 0x80]}) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000780)=ANY=[@ANYBLOB="7f0200000022000000000000000000005f000000000000004e072507f2613129a79086ecae6f0b06dfa1ca3aeaa6b4f7ecf562b940014fc0f0a8c760d3f9e7db9a06140036ac3705d96b8bd0205b3d88e04f3994fa54f921047d401ad3c0b857d732d64bdee7e0828e48ea96bfa308322bbf43a283c59369001e001227f410eae842977b293a216fadfafa053be9dc6c0dcd46b8707d7e9feaeb6b25d7c2ba301a39a46f0d8d8f214bb8221b4bf271c2e3ef55db8cfe4e60844376cf2e59895e34220697a5e4e5008dae6747dbc4998796bceeb40766c5b49967b392", @ANYRESHEX=0x0, @ANYRESDEC=r3]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:32 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x7b, &(0x7f0000000080), 0x14) 02:05:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000100)=0xf7fffffc, 0x4) 02:05:32 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00V\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:32 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$SNDRV_PCM_IOCTL_DRAIN(r4, 0x4144, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000002100000000000579ecd48262f4cb0000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:32 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB="030000000000005f"]) 02:05:32 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x4}}) 02:05:32 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:random_device_t:s0\x00', 0x25, 0x2) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:32 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00W\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:32 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000000000000000000005f8f73c1fd86581153b6294efe3d5bd920e9072e059fa1ce194aed05ef0ea254a46b1e241396f76b26d9a8712a5d21c095dd87eb9dc77491fb035678a6cb9023a674eac854c09e3108546a72e027ed23d2d4a861f13e7830a560306e367825e9ca155a126b62d18cfd04f55fa34f079ecc8f45f2e199"]) 02:05:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:05:32 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, 0x0, 0x4240a2a0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 02:05:32 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r7}) ioctl$SIOCX25SFACILITIES(r4, 0x89e3, &(0x7f0000000000)={0x72, 0x2, 0x8, 0xc, 0xffffffff, 0x81}) r8 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r8, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:32 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000000)=""/112) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) [ 445.997424] audit: type=1400 audit(5885402732.543:80): avc: denied { relabelto } for pid=28295 comm="syz-executor.4" name="file0" dev="sda1" ino=16017 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:random_device_t:s0 tclass=file permissive=1 02:05:32 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:32 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:05:32 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = accept4$ax25(r2, &(0x7f0000000000)={{0x3, @null}, [@netrom, @netrom, @remote, @null, @null, @rose, @remote, @netrom]}, &(0x7f0000000100)=0x48, 0x80000) dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 446.135972] audit: type=1400 audit(5885402732.573:81): avc: denied { read } for pid=28295 comm="syz-executor.4" name="file0" dev="sda1" ino=16017 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:random_device_t:s0 tclass=file permissive=1 02:05:32 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) tgkill(0x0, r0, 0x17) r1 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x1, 0x2060c2) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000001c0)) r2 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000063859032d8bc4837000000005f"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r6, 0xc0a85322, &(0x7f0000000300)) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ff7000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff7000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f00000000c0)="d51f0be444beeee600e34efeb3abb38c0b0eaaf3bdd6b6e9d06245036b85d7e11969aa6461e891858324a4d19d8f317cf91c33a17e67477a884a3c205bc1dddd3105e923d2a92d3226474fc1a7bc8f0c19b34206662583eff8800bd53a04868173950f1428d099fc6651df974b39454578dab537f34588660e1cb08118a0e2fa8ef8da5a38ec1c4504565f992a04bf8bd5f14e0cae90c3c3130673a312303492f001a220ebc587", 0xa7, r4}, 0x68) 02:05:32 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00X\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 446.264094] audit: type=1400 audit(5885402732.573:82): avc: denied { open } for pid=28295 comm="syz-executor.4" path="/root/syzkaller-testdir950658862/syzkaller.ZvLrwg/907/file0" dev="sda1" ino=16017 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:random_device_t:s0 tclass=file permissive=1 [ 446.294320] audit: type=1400 audit(5885402732.573:83): avc: denied { ioctl } for pid=28295 comm="syz-executor.4" path="/root/syzkaller-testdir950658862/syzkaller.ZvLrwg/907/file0" dev="sda1" ino=16017 ioctlcmd=0x9436 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:random_device_t:s0 tclass=file permissive=1 02:05:32 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) getresgid(&(0x7f0000000340), &(0x7f00000003c0)=0x0, &(0x7f0000000500)) r4 = getegid() getgroups(0x2, &(0x7f0000000540)=[r3, r4]) lchown(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, r4) mount$9p_virtio(&(0x7f0000000180)='syz\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x2, &(0x7f0000000580)={'trans=virtio,', {[{@aname={'aname', 0x3d, 'ppp1wlan1#'}}, {@dfltuid={'dfltuid'}}], [{@hash='hash'}, {@uid_eq={'uid', 0x3d, r2}}, {@subj_type={'subj_type', 0x3d, 'posix_acl_access!'}}, {@subj_type={'subj_type', 0x3d, 'vboxnet0'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, '[mime_type'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x32, 0x63, 0x38, 0x38, 0x64, 0x62, 0x39], 0x2d, [0x65, 0x39, 0x38, 0x36], 0x2d, [0x62, 0x38, 0x63, 0x35], 0x2d, [0x39, 0x34, 0x0, 0x65], 0x2d, [0x33, 0x38, 0x39, 0x31, 0x30, 0x30, 0x56, 0x61]}}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@uid_lt={'uid<'}}]}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:32 executing program 1: open(&(0x7f0000000040)='.\x00', 0x0, 0x80) mkdir(0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x8) connect$rxrpc(r5, &(0x7f0000000000)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e20, 0x2, @private1, 0xff}}, 0x24) open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = dup(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$FIDEDUPERANGE(r7, 0xc0189436, &(0x7f0000000100)=ANY=[@ANYRESHEX, @ANYRES32=r6, @ANYRESOCT]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 02:05:32 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000000)) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) 02:05:33 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) 02:05:33 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00Y\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:33 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r5}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@mcast2, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) 02:05:33 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000e0010000000000000005f00000000000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:33 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100), &(0x7f00000003c0)=0x4) mkdir(0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) getsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f00000002c0)=""/208, &(0x7f0000000000)=0xd0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xb}, 0x0, 0x20000000, 0xab6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f0000000040)={0xfdd}) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000004000000000000005f00000000000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) 02:05:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 02:05:33 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0xfffffffffffffc3e) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000005f0000000000000015fef79d31645617d9c125cd89927b48f3a2a5b7fbc87a0596c79a83ca9d992016451054ac41a6f5a6dc456be00ed77424779e1bb8", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:33 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x6ac00, 0xe) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) 02:05:33 executing program 0: 02:05:33 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00Z\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:33 executing program 4: r0 = open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0xffffffffffffff36) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={@local, 0x2, r6}) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000100)=0x4) lseek(r0, 0x4, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r7, 0xc0189436, &(0x7f0000000200)=ANY=[]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:33 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$inet6(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x2b) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x1094c0, 0x1) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) mkdirat(r4, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x1a0) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000340)=ANY=[@ANYRES32=r4, @ANYRESHEX=r0, @ANYBLOB="337cfb0e46510a0824dc685ed784a162d764fc00225c5e57387cd94fc8c054aacab7e7a81614a8ca92101377651b3995125c835a2700825c987e3180c647c22da9e38039ec5c87f8ac79add5643291cedaeda1e03f3ff310bbe0684c30bff11184029f9f87b4f51d616d3a3e8191c05418989ef3aadd33cd56936f6e617ea557"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:33 executing program 0: 02:05:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = dup2(r1, r2) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000240)=0x80000000, 0x4) getsockname$inet(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, &(0x7f00000001c0)=0x10) r4 = dup(r0) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_NEIGHBORS(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r5, 0x4, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x80) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r6 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) 02:05:33 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r4}) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYRESHEX]) 02:05:33 executing program 2: 02:05:33 executing program 0: 02:05:33 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="ae2cd832bc10ddc733554c88d48906b7d183f060ebbc0ef380b5bc226d15e53f18a97cf5020f97663d8c290d5866f7240fd9"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:33 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x20, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, r4, 0x0, r6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r7, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000e8ffffff5f00000000000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x104) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000100)=0x8) 02:05:33 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00[\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:33 executing program 0: 02:05:33 executing program 2: 02:05:33 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="b7a4436d79320200b3f24cefa61582fbd2778e76954082b3a23e"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:33 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xe80c0, 0x20) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000000)={0x1, [0x7, 0x8], 0x8001}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x1) inotify_rm_watch(r4, r5) 02:05:34 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:34 executing program 0: 02:05:34 executing program 2: 02:05:34 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\\\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:34 executing program 0: 02:05:34 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$CAIFSO_LINK_SELECT(r2, 0x116, 0x7f, &(0x7f0000000000), 0x4) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) 02:05:34 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7a27fdb6, 0x71}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffefff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000080005f00000000000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:34 executing program 2: 02:05:34 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x81, 0x630402) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40485404, &(0x7f0000000400)={{0x0, 0x2, 0xffff02a5, 0x0, 0xa05e}, 0x0, 0x5}) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="2f24bb93caf174e83c81f7f03bfa1f210a57e191520772a3c0908d680286a9a98b97a11b8e850f38db4fb5bcc8e8b0868db08fcfea54ebbc8a2ca206bfae35a8e44a4928d85aae0f97ec47f6411342f2c703b7577c0a3b63aa130cfb699c68a0f5e50362f7002d0b8cb33c98ed8f259367a6b335b5db83017c33335c4de2f7e66ed823e29bb0bddcce8c9c0687ca137067769e5834918f3c6662e3ccbc9cb21faafb908b18df2af5f9380e39366d93376f52f72fd38aab"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:34 executing program 0: 02:05:34 executing program 2: 02:05:34 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000180), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x30, 0x1412, 0x20, 0x70bd29, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x5}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}]}, 0x30}}, 0x4) r2 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) 02:05:34 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00]\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:34 executing program 0: 02:05:34 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000680)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="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"]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:34 executing program 2: 02:05:34 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) getresgid(&(0x7f0000000340), &(0x7f00000003c0)=0x0, &(0x7f0000000500)) r1 = getegid() getgroups(0x2, &(0x7f0000000540)=[r0, r1]) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='9p\x00', 0x80000, &(0x7f0000000340)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r1}}, {@aname={'aname', 0x3d, '\'vboxnet0^ppp0'}}, {@version_L='version=9p2000.L'}, {@posixacl='posixacl'}, {@msize={'msize', 0x3d, 0x7}}], [{@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, '\xf0em0'}}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x32, 0x36, 0x32, 0x36, 0x61, 0x61, 0x33], 0x2d, [0x63, 0x65, 0x64, 0x34], 0x2d, [0x37, 0x32, 0x55, 0x62], 0x2d, [0x33, 0x31, 0x38, 0x30], 0x2d, [0x62, 0x35, 0x320473e3d3ebd0bf, 0x37, 0x36, 0x62, 0x30, 0x65]}}}, {@euid_eq={'euid'}}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x62, 0x37, 0x32, 0x61, 0x66, 0x37, 0x64], 0x2d, [0x63, 0x32, 0x33, 0x65], 0x2d, [0x38, 0x62, 0x66, 0x37], 0x2d, [0x37, 0x62, 0x65, 0x37], 0x2d, [0x0, 0x65, 0x30, 0x34, 0x64, 0x65, 0x36, 0x35]}}}, {@dont_appraise='dont_appraise'}, {@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}]}}) open(0x0, 0x141042, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) uname(&(0x7f0000000580)=""/67) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:34 executing program 2: 02:05:34 executing program 0: 02:05:34 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x207aae1106f34573, &(0x7f00000000c0)="39ebe36df03b007821458421fc5b64a2e99bf7c9d837155b2313c8147192e2cf9674a31a5d7f074ebc431f10bf280b2fab956d9aef7d670488ee4be30e16ed932bcadc4b699c2458d94149c944883188e7ba83f08d2d2a1dfee4ed5ea7eb8a0a943991bc23fa1eb820751b0dd62b780098042febdd63246dbd072f1906e8a78ed91d8d70d6b35c3e9bbe44636229591e991a01f5ade3ff12986bc5d59d046828a8303f98be4df6", 0xa7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r6}) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000180)={0x0, 0x8, 0x4, 0x0, 0x8, {0x0, 0x2710}, {0x5, 0x2, 0x7f, 0xdf, 0x35, 0x7, "0c58f5c1"}, 0xd96c, 0x3, @fd, 0x1ff, 0x0, r3}) r7 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r7, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="00041dcb21a2ee2b32000000000080005f"]) bind$l2tp(r7, &(0x7f0000000000)={0x2, 0x0, @broadcast, 0x1}, 0x10) 02:05:34 executing program 2: 02:05:34 executing program 0: 02:05:34 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x2000, 0x0, 0x0, 0x0, 0x5, 0x2}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) pipe(&(0x7f0000000000)) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x0) 02:05:34 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000005f0000000000e5b78dc2586ac1c29a3786979ad3dce7bf1897b18abb98d089e410e5d7be783fbc27f63f17ada1128c7773a213d942f923d99441c28a3adfb6b2b5241ed207c936122c9da518370057fc7511a728fcd32715c5ce2e76f6669cc2d10d8f30f6a746", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:34 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00^\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:34 executing program 5: write$9p(0xffffffffffffffff, &(0x7f0000000000)="4c9696ecedf2f4c87f81ef6c5613f00e6c4d41aec19f74607d4f84450800f613", 0x20) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) 02:05:34 executing program 0: 02:05:34 executing program 2: 02:05:34 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r4}) bind$tipc(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="a9eabdc1cd8e6aff36865d49646b40d65334fb17aa504915592e29c1cacbb87569778c9924ebd59b7fcf5719d78f1faa2882bf369522a8973f1ad871ef6c2711ee5ed52ed4daf3ab8b95be6cb85e7ed4164b"]) lsetxattr$security_capability(&(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000000)='security.capability\x00', &(0x7f0000000280)=@v3={0x3000000, [{0x1, 0x80000000}, {0x1, 0x40}]}, 0x18, 0x1) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:34 executing program 0: 02:05:34 executing program 2: 02:05:34 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f02000000000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:34 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x80) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="00eb9f29ba4ad9c3bf1c61afef053ae756"]) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB], 0x3}}, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x20, r3, 0x200, 0x70bd29, 0x25dfdbff, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x80, 0x1}}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000300)={0x1, [0x0]}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={r4, 0xef, 0x7, [0x3, 0x401, 0x81, 0x3, 0x200, 0x5, 0x6]}, &(0x7f0000000140)=0x16) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) fsetxattr$security_evm(r6, &(0x7f0000000000)='security.evm\x00', &(0x7f00000000c0)=ANY=[@ANYRES16], 0xa, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={r4, 0x8, 0x6, [0x8, 0x1000, 0x20, 0x8, 0xfff, 0x1000]}, 0x14) 02:05:34 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x151042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r8}) dup(r5) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:34 executing program 0: 02:05:35 executing program 2: 02:05:35 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0101000000000000000001000000440001000c00070000000000960000000c0006006c626c637200000008000b000a69700008000800000000000800090000000000080001000a000000080005"], 0x58}}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000429bd7000eedbdf25100000000800040000010062721f6bf9b2a9e00008000600c3df0000a6a35352fa845959553e9c1c266fcc2781067d2b9f24b89588807522698533d00c336636e4739f076d245de7bb83828365b61738f6c204d6e6e5f7af27dfab19dc1fca959694bcb8bafd226127e95064b8f5bac10034ef5b89ac"], 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0)=0x0) chown(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, r3) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000092a2eb3c320e2110000000408000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xc0045878, 0x0) 02:05:35 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000001000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000016c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f000000d240)=[{{0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000000)="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", 0xb40}], 0x1}}], 0x1, 0x0) 02:05:35 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r5}) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000ff0700000200005f00000000000000", @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:35 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r7}) r8 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0x2200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0xfff, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x8, 0x4}, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x10, 0x2, 0x8}, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x10000}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x8, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, [@generic={0x7, 0x5, 0x1, 0x0, 0x8}]}, &(0x7f0000000040)='syzkaller\x00', 0x80, 0x6a, &(0x7f00000002c0)=""/106, 0x40f00, 0x4, [], r7, 0x11, r8, 0x8, &(0x7f0000000340)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x2, 0x20, 0x1f}, 0x10, r9, r0}, 0x78) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:35 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'hsr0\x00', @broadcast}) 02:05:35 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x7ffffff7, 0x0) poll(&(0x7f0000000100)=[{r0, 0x125c3}], 0x1, 0x0) io_setup(0x0, &(0x7f0000000080)) r1 = socket(0xa, 0x0, 0x0) connect$inet6(r1, 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) sendmsg$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000240)="b8", 0x1}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x4000}, 0x20000040) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20d80, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000040), 0x0) dup2(r2, r0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) socket$unix(0x1, 0x1, 0x0) [ 449.103789] device hsr0 entered promiscuous mode [ 449.109592] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 449.116125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 449.130636] device hsr0 left promiscuous mode 02:05:35 executing program 4: open(0x0, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x3d3000) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000280)={0x40000000000, 0x101, 0x6, 0x1000, 0x8, [{0x6, 0x6, 0x0, [], 0x3887}, {0x5, 0xfffffffffffff46c, 0x3, [], 0x4}, {0xfffffffffffffff7, 0x87, 0x3, [], 0x1180}, {0x4, 0xb4d5, 0x1ff, [], 0x803}, {0x9, 0x8, 0x3, [], 0x8}, {0x80000000, 0x1, 0x80000001, [], 0x181}, {0x10000, 0x68f, 0xd8, [], 0x900}, {0x1, 0x1, 0xd8ab, [], 0x400}]}) mkdir(0x0, 0x0) r1 = open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:35 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000002000000", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:35 executing program 1: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="3e9d0f1283fb240000022041d359542ef54be427e6c6ad160787fb87e5241a6b3c9c86a100ecb948971ad22c1f6bf35fd18c82c2f51ad0f0a12d830427d2a70a15528bb7d770f9b53ba26455bb406bad68e802d52118b18ef96c2f41f7d4fcd9904f5f6b8f087885c6c22b1e3927e71f3108975d618d3e74d52675f181c630cc43e8e6dc438e5957fc0b42931efd977553bfec14df384773d30b1c1c01244e06c32863831143489fc7d7917e2178c5ce814e633bab306db077767400000000000000"]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r5, r4, 0x0, 0x20000000000000d8) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000001c0)) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:35 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYRESHEX=r0]) 02:05:35 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x7ffffff7, 0x0) poll(&(0x7f0000000100)=[{r0, 0x125c3}], 0x1, 0x0) io_setup(0x0, &(0x7f0000000080)) r1 = socket(0xa, 0x0, 0x0) connect$inet6(r1, 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) sendmsg$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000240)="b8", 0x1}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x4000}, 0x20000040) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20d80, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000040), 0x0) dup2(r2, r0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) socket$unix(0x1, 0x1, 0x0) 02:05:35 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x8000) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000100)={0x3, 0x0, [{0x0, 0x80000000, 0x3, 0x80, 0x9, 0x80000001, 0xa7}, {0xc0000001, 0x5b2a2ac7, 0x6, 0x20, 0x9, 0xfffffffc, 0x3}, {0x0, 0x101, 0x4, 0x1, 0xd4ca, 0x80000000, 0x323}]}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:35 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000000c0)=ANY=[@ANYBLOB="00002800000100ffff000000000000005ff406e1f163c7b3840f3260c63f1faed3d7de37d2414d2c7b6bc393c963457673c7b2bd632f281f8cd7416a5e69fb15a397a84934e1cbbff57a6174c98e2a9f89c22915781d9dd933196356dd675e3424f40187e38b26351bddf0ad02f555861bdfebcb088b991537cf8ee9cc19f0c22a8a592f5b0ce0aa3590431c3e23d6e07cf4e310cccfc0a91cccaa19c22949c92fde431bbc798ca2ea567d5a5bf7099c4d57ef2d77d4e054124b381b332ca17ae8545251902814061d9a2b9d570649c55a1c7fda587e087d7c96e5a5fea4d814773549af3021c93bf3166d8b4121aa7c16be3da5bf7547e3595d33ecbbec0bbb732d18153fed0f2fccc0b7bd2e7c476b"]) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xf1) 02:05:36 executing program 2: close(0xffffffffffffffff) syz_genetlink_get_family_id$batadv(0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x5) dup3(r1, r0, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x40000}]) 02:05:36 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000005f00000000000001", @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:36 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0, r5}) write$P9_RAUTH(r2, &(0x7f0000000000)={0x14, 0x67, 0x1, {0x22, 0x1, 0x8}}, 0x14) 02:05:36 executing program 0: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000040)=""/181) [ 449.691734] kauditd_printk_skb: 2 callbacks suppressed [ 449.691748] audit: type=1804 audit(5885402736.233:86): pid=28665 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir525264360/syzkaller.kSpQAo/704/bus" dev="sda1" ino=16530 res=1 02:05:36 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) r2 = dup3(r0, r1, 0x0) getsockopt$inet6_dccp_int(r2, 0x21, 0x4, &(0x7f0000000000), &(0x7f0000000100)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000016c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-avx\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f000000d240)=[{{0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000000)="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", 0xb40}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 02:05:36 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 449.907940] audit: type=1804 audit(5885402736.243:87): pid=28670 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir525264360/syzkaller.kSpQAo/704/bus" dev="sda1" ino=16530 res=1 02:05:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x20a927, 0x2d, 0x0, 0xffffffffffffff9c}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x204000, 0x0, 0x30051, r4, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000200)={[], 0x1f000}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 02:05:37 executing program 5: write$9p(0xffffffffffffffff, &(0x7f00000002c0)="4c9696ecedf2f4c87f81e774607d4f84632259f613", 0x15) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB="000040000000e40600ff00005f000000002b2580f86c9642da342d278cc3db8c47dec6"]) 02:05:37 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x5c, r1, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_virt_wifi\x00'}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x8001}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) open(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xa000, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:37 executing program 2: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) 02:05:37 executing program 3: open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) recvfrom$phonet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) sendto(0xffffffffffffffff, &(0x7f00000003c0)="93c2cbb929c279689adce98edeb2c71eaa270447bd3dd955ff39751653732c3e56c4db77f02a343f6bb89d8a20011a0810efe7c8be162f4ea1405182af44ec5e81f72982082b88fb3ea8b72eb16510a87a987b17c0889bf74ee992a3d55245db497db95a1933dbbc014fad70ecfc2c4ac211247847db970939c8edcbfae841f93c409290b940bf5d64e46bffebcbd5b716fafe5f2315f82471c8e35f4d40de2c4346101f3c123c73700b2195f352d5f36a64942f4eeda2ab836cbabb75effa95da21c7378f3bfe92c7b00c5c", 0xcc, 0x0, &(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x4, @dev={[], 0x44}, 'netpci0\x00'}}, 0x80) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001a40)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x10000000002) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8001, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f00000001c0)={0x7b, 0x0, [0x10000, 0x85, 0x0, 0x100000001]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f00000004c0)=""/248, 0xf8) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f0000000140)={0x9, "ef8c7aed3ffbe0fdf06f930de88799bb141a10ad79b44b3bf0de80af73970596", 0x2, 0x0, 0x20, 0x10001, 0x0, 0x0, 0x6, 0x1}) socket$inet_udplite(0x2, 0x2, 0x88) [ 450.739425] ------------[ cut here ]------------ [ 450.744563] kernel BUG at arch/x86/kvm/mmu.c:3279! [ 450.749720] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 450.755094] CPU: 0 PID: 28719 Comm: syz-executor.0 Not tainted 4.19.124-syzkaller #0 [ 450.762980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 450.772368] RIP: 0010:transparent_hugepage_adjust+0x4c2/0x550 [ 450.778247] Code: ff e8 f2 1d 58 00 48 8b 44 24 10 48 83 e8 01 48 89 04 24 e9 a3 fd ff ff 48 89 df e8 f8 cb 8d 00 e9 7d fb ff ff e8 ce 1d 58 00 <0f> 0b 48 8b 3c 24 e8 e3 cb 8d 00 e9 af fc ff ff 49 8d 7f 30 e8 c5 [ 450.797146] RSP: 0018:ffff888049167698 EFLAGS: 00010216 [ 450.802503] RAX: 0000000000040000 RBX: ffff888049167770 RCX: ffffc90005aa8000 [ 450.809766] RDX: 00000000000030b5 RSI: ffffffff810f6b22 RDI: 0000000000000007 [ 450.817024] RBP: ffff888049167760 R08: ffff88804cca84c0 R09: ffffed1004b8a052 [ 450.824298] R10: ffffed1004b8a051 R11: ffff888025c5028b R12: 000000000000000a [ 450.831557] R13: 0000000000000000 R14: 0000000000024a05 R15: 0000000000000001 [ 450.838840] FS: 00007f6a16930700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 450.847053] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 450.852924] CR2: 0000000000000000 CR3: 000000009ee7d000 CR4: 00000000001426f0 [ 450.860185] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 450.867445] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 450.874726] Call Trace: [ 450.877342] tdp_page_fault+0x550/0x670 [ 450.881311] ? ept_page_fault+0x1820/0x1820 [ 450.885627] ? vmx_prepare_switch_to_host+0x46e/0x8f0 [ 450.890822] ? assoc_array_gc+0x1221/0x1250 [ 450.895145] kvm_mmu_page_fault+0x193/0x12c0 [ 450.899552] ? kvm_mmu_unprotect_page_virt+0x80/0x80 [ 450.904652] ? __vmx_complete_interrupts+0x36b/0x3d0 [ 450.909748] ? check_preemption_disabled+0x41/0x280 [ 450.914759] ? rcu_read_lock_sched_held+0x10a/0x130 [ 450.919769] ? handle_ept_violation+0x190/0x510 [ 450.924431] ? handle_ept_misconfig+0x3e0/0x3e0 [ 450.929096] vmx_handle_exit+0x273/0x16a0 [ 450.933341] ? lock_acquire+0x170/0x3c0 [ 450.937371] ? kvm_arch_vcpu_ioctl_run+0x26b6/0x6b70 [ 450.942505] ? kvm_arch_vcpu_ioctl_run+0x264d/0x6b70 [ 450.947610] kvm_arch_vcpu_ioctl_run+0x282c/0x6b70 [ 450.952551] ? __mutex_lock+0x30a/0x1300 [ 450.956612] ? kvm_vcpu_ioctl+0x175/0xe20 [ 450.960767] ? kvm_arch_vcpu_runnable+0x690/0x690 [ 450.965609] ? lock_downgrade+0x740/0x740 [ 450.969748] ? lock_acquire+0x170/0x3c0 [ 450.973719] ? check_preemption_disabled+0x41/0x280 [ 450.978732] ? kvm_vcpu_ioctl+0x493/0xe20 [ 450.982874] kvm_vcpu_ioctl+0x493/0xe20 [ 450.986851] ? kvm_vm_ioctl_check_extension_generic+0xc0/0xc0 [ 450.992730] ? mark_held_locks+0xf0/0xf0 [ 450.996787] ? mark_held_locks+0xf0/0xf0 [ 451.000840] ? userfaultfd_unmap_prep+0x490/0x490 [ 451.005677] ? __might_fault+0x11f/0x1d0 [ 451.009729] ? __fget+0x31e/0x520 [ 451.013176] ? kvm_vm_ioctl_check_extension_generic+0xc0/0xc0 [ 451.019051] do_vfs_ioctl+0xcda/0x12e0 [ 451.022935] ? selinux_file_ioctl+0x125/0x5d0 [ 451.027422] ? check_preemption_disabled+0x41/0x280 [ 451.032426] ? ioctl_preallocate+0x200/0x200 [ 451.036829] ? selinux_socket_sock_rcv_skb+0x570/0x570 [ 451.042100] ? __fget+0x345/0x520 [ 451.045546] ? ksys_dup3+0x3c0/0x3c0 [ 451.049254] ? security_file_ioctl+0x6c/0xb0 [ 451.053653] ksys_ioctl+0x9b/0xc0 [ 451.057098] __x64_sys_ioctl+0x6f/0xb0 [ 451.060981] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 451.065553] do_syscall_64+0xf9/0x620 [ 451.069351] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 451.074532] RIP: 0033:0x45ca29 [ 451.077830] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 451.096733] RSP: 002b:00007f6a1692fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 451.104438] RAX: ffffffffffffffda RBX: 00000000004e7fc0 RCX: 000000000045ca29 [ 451.111699] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000008 [ 451.118968] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 451.126228] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 451.133621] R13: 00000000000003c6 R14: 00000000004c6703 R15: 00007f6a169306d4 [ 451.140889] Modules linked in: [ 451.144379] ---[ end trace fb8f685a2be98e2d ]--- [ 451.149341] RIP: 0010:transparent_hugepage_adjust+0x4c2/0x550 [ 451.155252] Code: ff e8 f2 1d 58 00 48 8b 44 24 10 48 83 e8 01 48 89 04 24 e9 a3 fd ff ff 48 89 df e8 f8 cb 8d 00 e9 7d fb ff ff e8 ce 1d 58 00 <0f> 0b 48 8b 3c 24 e8 e3 cb 8d 00 e9 af fc ff ff 49 8d 7f 30 e8 c5 [ 451.174181] RSP: 0018:ffff888049167698 EFLAGS: 00010216 [ 451.179546] RAX: 0000000000040000 RBX: ffff888049167770 RCX: ffffc90005aa8000 02:05:37 executing program 1: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdir(0x0, 0x0) r1 = open(0x0, 0x141042, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setgroups(0x2, &(0x7f0000000040)=[0x0, 0x0]) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000001a80)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001ac0)={0x0, 0x0}, &(0x7f0000001b00)=0xc) getresgid(&(0x7f0000000340), &(0x7f00000003c0)=0x0, &(0x7f0000000500)) r9 = getegid() getgroups(0x2, &(0x7f0000000540)=[r8, r9]) sendmsg$netlink(r1, &(0x7f0000001c40)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfb, 0x4000000}, 0xc, &(0x7f0000000100)=[{&(0x7f00000002c0)={0x224, 0x34, 0x4, 0x70bd26, 0x25dfdbfd, "", [@nested={0x10d, 0x4d, 0x0, 0x1, [@generic="6351e07b14ea24b02f00744312715d0ee172396128829eacb030c42f6f30f47317e85772e3d3885eaad8bc84382fd1e2e13742348bd97823fb09abfb9d8e95e3eab38e5866ae42c8e480f8c2f981a3dc198d0b0b49259a7590af1f07319695247114466f58f1011fc14021e6221425f82c67b36d53aabd18b022f59749192a42cb0b7daf4ad77d11a464d372f76e4f3ece6d0b3559efb01fa083a04e620ccb1720b668d58b8f2421dd19b8c9b6fed740ded9315bede109bddefbb35ef60416bf771c6975", @typed={0x34, 0x1b, 0x0, 0x0, @str='(self,cgroup()user&{GPLuservboxnet1eth0(#$wlan0\x00'}, @generic="96ee288f3c56f35dab11e65eac7b1559d5"]}, @typed={0x8, 0x4e, 0x0, 0x0, @uid}, @nested={0xf0, 0x9, 0x0, 0x1, [@typed={0xec, 0xa, 0x0, 0x0, @binary="bd1281d1c69d54b36b5b38b89eb60883234d5c24fe446b07ad22aa258fdba3041a5fd4084b49d99df6e32540d04b2adb8d57bbe34a897c364530f4f8d2d13fd36bc381d5dfe9eb28ee6ae2410e1711f319c8c334016a8e02407cb31efeb55e40043d241141bdd43e9144cca494b0124b6b28fd4608ea08e8874cdf1f015e46cf775a1ea34d979d6e747f0dc0155c528b93c958f2d29cc605e21bca2876e2db80a8feddb8238b039ae8c29a933b025d18abb3779516a56f95b1056d6af0d079fcf80453bb5210126957db1348f039c2e23bf7c30bdf7d2d0c21ecafa290cc16b049055236b511e499"}]}, @typed={0x4, 0x63}, @typed={0x8, 0x15, 0x0, 0x0, @fd=r2}]}, 0x224}, {&(0x7f0000000500)={0x13e4, 0x37, 0x8, 0x70bd25, 0x25dfdbfe, "", [@generic="b2dd08dd11f8921fd3919cf6f35e71d71738bcf148ebae1fc09663abe17908ab855d5793c9b1a332963db202ff852350a0b39ebea0bae5837c7f8783c692c33218c59a602236c7d5319f2476f9ab6a9a2e988b4ace63ecd6b95d2421d0a7207bd615720bbf5fe5d1fd676c18eb2277e013654b9b32514788b6d1129386688771188cffe6264bfc12d3b35337fe53e032f7e96cf59ee25748b0969479c3904cb3748a57f4f228c917d800398b85f311e6e740ae2899b4b41b16ee62dc4842ae38be04063bd34f", @generic="f707e452342261d311e4761b3bcee86666bfb8108fad0df24484a0170f815588eec4243b2a3233cfaa042822f7", @nested={0x11a6, 0x3d, 0x0, 0x1, [@typed={0xc9, 0x2c, 0x0, 0x0, @binary="da1b9626b0fcb4b521a572c9f6e1ab22700625a3d2a65584693f21df20665f0c949e8c8a7c4cfaac47340ddbea35f3bb8523d37f759ef80ac64ddd8fa80b5a2a88e0f1973a640f74fd191aec1501ea4e518602257e792107801394e1ce8b2e63f53c6aa151b5ff5e33adcac7130c7e7d0b05ea3a1415d0da9d73cefba6b48771d38aa5ac82594ad324b88fc8b767636583697cdd78ffd475de252f3767b1f4da483beb6b56c121f46366a8d7d8ee5c8c1719bc69d8b9dc752d7ccf7f438cd13d5df1408cf1"}, @generic="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", @generic="3b9fe6898630d0a292b2106084a780dfa9b4c2a574919a29ae41ed8a72f1c4c3b42c1bb8f76ae36ffae7690ce6c7b8f96be92756ca37273f9721859d7e243bd53b57cbfce33f8f23d23a6b684121efe62b908c9b01627fc57138dfe35ff8d69e256b1e129e5f7d75b87286d8d70f96fca488d49524d908152b664455fa511ee9f699c7d60532717a777b4c2c5bf28042a5f408d6d863af8bb061af254a6fe672e9afa85f06af1f8993825b8f84a122e110d9cc22df39dcbc7aff98bb99d192cdbc7ddc91ae5b51b36c0d82e9cc8f068d3fc4b1dcf389"]}, @typed={0x8, 0x75, 0x0, 0x0, @ipv4=@loopback}, @nested={0xac, 0x1, 0x0, 0x1, [@generic="1d09f41f1eba6fb6dda4247d5a9a2d4d6aaf82b5345f", @typed={0xc, 0xc, 0x0, 0x0, @u64=0x401}, @generic="d53c081a671ea70e46ba40a6db38b761735b68bdbbaad9c0df2534c0ec9a9993988eb57694c8c450e25e1225112fb7685cc99901ed445b185fae2d7fa0a99b5778c943b8d932a6f70a59171122792431d1f45deba43b1cf56cf16751ef7f02be0e20ed56122b111439afbeae2063f9b690c7", @typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x8, 0x7, 0x0, 0x0, @uid}]}, @typed={0x8, 0x87, 0x0, 0x0, @u32=0x6c3}, @typed={0x11, 0x4d, 0x0, 0x0, @str='trusted[@GPL\x00'}, @typed={0xf, 0x4d, 0x0, 0x0, @str='vboxnet1@&\x00'}, @typed={0x8, 0x3e, 0x0, 0x0, @pid}, @generic="a4137f39e1f00a580064f57c85f83ba011f5ec3cd003d000ed0a7ae3f0885ef1d317c78eae9e6095fc5004b90b9b939aa1770ffdbddc7214e224d0b412bcc0b1c5d80883d52546b6dd5c8e06e3bc978c"]}, 0x13e4}, {&(0x7f0000001900)={0xfc, 0x3d, 0xa20, 0x70bd25, 0x25dfdbfd, "", [@generic="8ac5da41ab8133a810f5d086846666757ab057c212597c3ebb7c046c2099a1813fef", @typed={0x8, 0x79, 0x0, 0x0, @ipv4=@remote}, @generic="af4e28dfbba181bd73567e9bb36f724a86896b40db5a13af5ea9071e276f95467afdadd811a84f205db9518e336b0b23619940c762884a9bb3f6bbb91c814f7eaabbc52a2004a08a2fc1d192106865afa535d9888aaada597c664f4025f3baa9e3afc235b65b1bd96d0d5d7cc848e20ef687e9bd37311ccc3185bacf0090c064599c26090efb00574130d69e2b87c8d98a6c5810c3a390c9169356044192360068b5c8ab", @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@mcast2}, @typed={0x8, 0x2e, 0x0, 0x0, @fd=r2}]}, 0xfc}, {&(0x7f0000000040)={0x18, 0x14, 0x10, 0x70bd29, 0x25dfdbfd, "", [@typed={0x8, 0x43, 0x0, 0x0, @pid}]}, 0x18}], 0x4, &(0x7f0000001b40)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x20, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r5, 0xffffffffffffffff, r3]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r6, r7, r9}}}], 0xe8, 0x40040}, 0x20000000) r10 = dup(r5) getsockname$packet(r10, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9a7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r11, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:05:37 executing program 4: open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @remote}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB]) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 451.186856] RDX: 00000000000030b5 RSI: ffffffff810f6b22 RDI: 0000000000000007 [ 451.194164] RBP: ffff888049167760 R08: ffff88804cca84c0 R09: ffffed1004b8a052 [ 451.201438] R10: ffffed1004b8a051 R11: ffff888025c5028b R12: 000000000000000a [ 451.208736] R13: 0000000000000000 R14: 0000000000024a05 R15: 0000000000000001 [ 451.216044] FS: 00007f6a16930700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 451.224326] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 451.230207] CR2: 0000000000000000 CR3: 000000009ee7d000 CR4: 00000000001426f0 [ 451.237538] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 451.244886] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 451.252175] Kernel panic - not syncing: Fatal exception [ 451.258991] Kernel Offset: disabled [ 451.262606] Rebooting in 86400 seconds..